Identity-based authenticated key agreement protocol based on Weil pairing
From MaRDI portal
Publication:3577932
DOI10.1049/el:20020387zbMath1190.94033OpenAlexW2098996144MaRDI QIDQ3577932
Publication date: 10 July 2010
Published in: Electronics Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1049/el:20020387
Related Items
Identity based group key agreement in multiple PKG environment ⋮ Further refinement of pairing computation based on Miller's algorithm ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Provably secure identity-based authenticated key agreement protocols with malicious private key generators ⋮ An improved two-party identity-based authenticated key agreement protocol using pairings ⋮ Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol ⋮ Faster pairing computation on genus \(2\) hyperelliptic curves ⋮ A new certificateless multiple key agreement scheme ⋮ An efficient dynamic authenticated key exchange protocol with selectable identities ⋮ Zero-knowledge identification scheme based on Weil pairing ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ An Identity-Based Key Agreement Protocol for the Network Layer ⋮ Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\) ⋮ A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols ⋮ Identity-based authenticated key agreement protocol based on Weil pairing ⋮ Efficient identity-based authenticated key agreement protocol from pairings ⋮ Simple authenticated key agreement and protected password change protocol ⋮ A pairing-based publicly verifiable secret sharing scheme ⋮ Provably secure non-interactive key distribution based on pairings ⋮ Generating more MNT elliptic curves ⋮ Efficient computation of roots in finite fields ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited ⋮ A Provably Secure One-Pass Two-Party Key Establishment Protocol ⋮ A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges ⋮ Comment on a certificateless one-pass and two-party authenticated key agreement protocol ⋮ Authenticated Key Exchange with Entities from Different Settings and Varied Groups ⋮ A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN ⋮ An improved identity-based key agreement protocol and its security proof ⋮ A NEW BATCH IDENTIFICATION SCHEME ⋮ A group key agreement protocol from pairings ⋮ Several security schemes constructed using ECC-based self-certified public key cryptosystems ⋮ Signcryption with non-interactive non-repudiation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Strongly secure identity-based authenticated key agreement protocols
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Identity-Based Cryptosystems and Signature Schemes
- Strongly Secure Certificateless Key Agreement
- Stronger Security of Authenticated Key Exchange
- Identity-based authenticated key agreement protocol based on Weil pairing
- Key agreement protocols and their security analysis
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Modular Security Proofs for Key Agreement Protocols
- The Twin Diffie-Hellman Problem and Applications
- Progress in Cryptology – Mycrypt 2005
- Topics in Cryptology – CT-RSA 2005