Identity-based authenticated key agreement protocol based on Weil pairing

From MaRDI portal
Publication:3577932

DOI10.1049/el:20020387zbMath1190.94033OpenAlexW2098996144MaRDI QIDQ3577932

Nigel P. Smart

Publication date: 10 July 2010

Published in: Electronics Letters (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1049/el:20020387




Related Items

Identity based group key agreement in multiple PKG environmentFurther refinement of pairing computation based on Miller's algorithmPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesProvably secure identity-based authenticated key agreement protocols with malicious private key generatorsAn improved two-party identity-based authenticated key agreement protocol using pairingsCryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement ProtocolFaster pairing computation on genus \(2\) hyperelliptic curvesA new certificateless multiple key agreement schemeAn efficient dynamic authenticated key exchange protocol with selectable identitiesZero-knowledge identification scheme based on Weil pairingCryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomialsAn efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversariesSecurity weaknesses of a signature scheme and authenticated key agreement protocolsAn Identity-Based Key Agreement Protocol for the Network LayerEta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsIdentity-based authenticated key agreement protocol based on Weil pairingEfficient identity-based authenticated key agreement protocol from pairingsSimple authenticated key agreement and protected password change protocolA pairing-based publicly verifiable secret sharing schemeProvably secure non-interactive key distribution based on pairingsGenerating more MNT elliptic curvesEfficient computation of roots in finite fieldsSimulatable certificateless two-party authenticated key agreement protocolOn cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisitedA Provably Secure One-Pass Two-Party Key Establishment ProtocolA pairing-free identity-based authenticated key agreement protocol with minimal message exchangesComment on a certificateless one-pass and two-party authenticated key agreement protocolAuthenticated Key Exchange with Entities from Different Settings and Varied GroupsA Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPANAn improved identity-based key agreement protocol and its security proofA NEW BATCH IDENTIFICATION SCHEMEA group key agreement protocol from pairingsSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsSigncryption with non-interactive non-repudiation



Cites Work