Applied Cryptography and Network Security
From MaRDI portal
Publication:4680940
DOI10.1007/B98360zbMATH Open1103.68508OpenAlexW4301861138MaRDI QIDQ4680940FDOQ4680940
Kenneth G. Paterson, Wenbo Mao, Colin A. Boyd
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (12)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- An improved two-party identity-based authenticated key agreement protocol using pairings
- An efficient dynamic authenticated key exchange protocol with selectable identities
- On the multi-user security of LWE-based NIKE
- A Provably Secure One-Pass Two-Party Key Establishment Protocol
- One-round identity-based key exchange with perfect forward security
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Efficient One-Round Key Exchange in the Standard Model
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
- Towards tight adaptive security of non-interactive key exchange
- Key agreement via protocols
- Non-Interactive Key Exchange
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680940)