Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
From MaRDI portal
(Redirected from Publication:433086)
Recommendations
- Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
- Identity-based authenticated asymmetric group key agreement protocol
- One-round authenticated group key exchange from isogenies
- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round
- One-round identity-based key exchange with perfect forward security
- Authenticated asymmetric group key agreement based on certificateless cryptosystem
- An ID-based authenticated dynamic group key agreement with optimal round
- Provably secure certificateless one-way and two-party authenticated key agreement protocol
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1088922 (Why is no real title available?)
- scientific article; zbMATH DE number 2081072 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2086715 (Why is no real title available?)
- A one round protocol for tripartite Diffie-Hellman
- A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
- Advances in Cryptology - CRYPTO 2003
- Asymmetric Group Key Agreement
- Authenticated key exchange secure against dictionary attacks
- Batch Verification of Short Signatures
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- Efficient many-to-one authentication with certificateless aggregate signatures
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption from the Weil Pairing
- Identity-based authenticated asymmetric group key agreement protocol
- Identity-based cryptosystems and signature schemes
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- Modular Security Proofs for Key Agreement Protocols
- New directions in cryptography
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- Secure integration of asymmetric and symmetric encryption schemes
- Simulatable certificateless two-party authenticated key agreement protocol
Cited in
(13)- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Identity-based authenticated asymmetric group key agreement protocol
- A hierarchical group key agreement protocol using orientable attributes for cloud computing
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- Asymmetric Group Key Agreement
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol
- One-round exposure-resilient identity-based authenticated key agreement with multiple private key generators
- Authenticated asymmetric group key agreement based on certificateless cryptosystem
- Secure multiparty computation of solid geometric problems and their applications
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
This page was built for publication: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q433086)