An improved two-party identity-based authenticated key agreement protocol using pairings
From MaRDI portal
Publication:414861
DOI10.1016/j.jcss.2011.01.002zbMath1277.94055MaRDI QIDQ414861
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
Publication date: 11 May 2012
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2011.01.002
cryptography; security; authentication; identity-based; bilinear pairing; signature scheme; two-party authenticated key agreement protocols
94A62: Authentication, digital signatures and secret sharing
Related Items
Robust and efficient authentication scheme for session initiation protocol, Security weaknesses of a signature scheme and authenticated key agreement protocols, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
Cites Work
- Efficient identity-based authenticated key agreement protocol from pairings
- Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
- An efficient protocol for authenticated key agreement
- Identity-Based Cryptosystems and Signature Schemes
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
- Identity-based authenticated key agreement protocol based on Weil pairing
- New directions in cryptography
- Reducing elliptic curve logarithms to logarithms in a finite field
- Key agreement protocols and their security analysis
- Applied Cryptography and Network Security
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
- Identity-Based Encryption from the Weil Pairing
- Topics in Cryptology – CT-RSA 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item