Applied Cryptography and Network Security
From MaRDI portal
Publication:4680940
DOI10.1007/B98360zbMATH Open1103.68508OpenAlexW4301861138MaRDI QIDQ4680940FDOQ4680940
Authors: Wenbo Mao, Kenneth G. Paterson, Colin A. Boyd
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (15)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- An improved two-party identity-based authenticated key agreement protocol using pairings
- An efficient dynamic authenticated key exchange protocol with selectable identities
- On the multi-user security of LWE-based NIKE
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- One-round identity-based key exchange with perfect forward security
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Non-interactive key exchange
- Efficient One-Round Key Exchange in the Standard Model
- Reusing static keys in key agreement protocols
- Authenticated commutator key agreement protocol
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
- Authentification ranks with identities based on elliptic curves
- Towards tight adaptive security of non-interactive key exchange
- Key agreement via protocols
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680940)