Identity-based authenticated key agreement protocol based on Weil pairing
From MaRDI portal
Publication:3577932
DOI10.1049/EL:20020387zbMATH Open1190.94033OpenAlexW2098996144MaRDI QIDQ3577932FDOQ3577932
Authors: N. P. Smart
Publication date: 10 July 2010
Published in: Electronics Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1049/el:20020387
Recommendations
- AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING
- Efficient identity-based authenticated key agreement protocol from pairings
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Pairwise key agreement protocols based on the Weil pairing
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Identity-based cryptosystems and signature schemes
- Key agreement protocols and their security analysis
- Title not available (Why is that?)
- Modular Security Proofs for Key Agreement Protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Strongly Secure Certificateless Key Agreement
- Identity-based authenticated key agreement protocol based on Weil pairing
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2005
- The Twin Diffie-Hellman Problem and Applications
- Progress in Cryptology – Mycrypt 2005
- Strongly secure identity-based authenticated key agreement protocols
Cited In (42)
- A group key agreement protocol from pairings
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Identity based group key agreement in multiple PKG environment
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries
- Signcryption with non-interactive non-repudiation
- A pairing-based publicly verifiable secret sharing scheme
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- An Identity-Based Key Agreement Protocol for the Network Layer
- Simulatable certificateless two-party authenticated key agreement protocol
- An efficient dynamic authenticated key exchange protocol with selectable identities
- Simple authenticated key agreement and protected password change protocol
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- Authenticated key exchange with entities from different settings and varied groups
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- An improved identity-based key agreement protocol and its security proof
- Efficient computation of roots in finite fields
- Provably secure non-interactive key distribution based on pairings
- Efficient identity-based authenticated key agreement protocol from pairings
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- A new certificateless multiple key agreement scheme
- Comment on a certificateless one-pass and two-party authenticated key agreement protocol
- AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING
- Generating more MNT elliptic curves
- A NEW BATCH IDENTIFICATION SCHEME
- Zero-knowledge identification scheme based on Weil pairing
- Faster pairing computation on genus \(2\) hyperelliptic curves
- ID-based public key cryptographic systems
- A privacy-preserving ID-based group key agreement scheme applied in VPAN
- New Kerberos protocol based on Weil pairing
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Further refinement of pairing computation based on Miller's algorithm
- Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
- Identity-based authenticated key agreement protocol based on Weil pairing
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Pairwise key agreement protocols based on the Weil pairing
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
This page was built for publication: Identity-based authenticated key agreement protocol based on Weil pairing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577932)