A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
From MaRDI portal
(Redirected from Publication:507654)
Recommendations
- Making the Diffie-Hellman Protocol Identity-Based
- Identity-based Encryption from the Diffie-Hellman Assumption
- Identity-based encryption from the Diffie-Hellman assumption
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- An Interpretation of Identity-Based Cryptography
- Identity-based extractable hash proofs and their applications
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- A Framework for Identity-Based Encryption with Almost Tight Security
- Security in Communication Networks
Cites work
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- scientific article; zbMATH DE number 1304129 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1942431 (Why is no real title available?)
- scientific article; zbMATH DE number 2086872 (Why is no real title available?)
- scientific article; zbMATH DE number 2086895 (Why is no real title available?)
- A note on negligible functions
- An efficient protocol for authenticated key agreement
- Applied Cryptography and Network Security
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
- Efficient identity-based authenticated key agreement protocol from pairings
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Identity-Based Encryption from the Weil Pairing
- Identity-based authenticated key agreement protocol based on Weil pairing
- Identity-based cryptosystems and signature schemes
- Key agreement protocols and their security analysis
- Modular Security Proofs for Key Agreement Protocols
- New directions in cryptography
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Progress in Cryptology – Mycrypt 2005
- Protocols for authentification and key establishment
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Stronger Security of Authenticated Key Exchange
Cited in
(3)
This page was built for publication: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q507654)