A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
From MaRDI portal
Publication:507654
DOI10.1016/J.INS.2014.05.041zbMATH Open1360.94302OpenAlexW2155685591MaRDI QIDQ507654FDOQ507654
Kim-Kwang Raymond Choo, Dongho Won, Junghyun Nam
Publication date: 7 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.05.041
Recommendations
- Making the Diffie-Hellman Protocol Identity-Based
- Identity-based Encryption from the Diffie-Hellman Assumption
- Identity-based encryption from the Diffie-Hellman assumption
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- An Interpretation of Identity-Based Cryptography
- Identity-based extractable hash proofs and their applications
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- A Framework for Identity-Based Encryption with Almost Tight Security
- Security in Communication Networks
Cites Work
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Identity-Based Cryptosystems and Signature Schemes
- New directions in cryptography
- Key agreement protocols and their security analysis
- Identity-Based Encryption from the Weil Pairing
- Modular Security Proofs for Key Agreement Protocols
- A note on negligible functions
- Title not available (Why is that?)
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Protocols for authentification and key establishment
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Efficient identity-based authenticated key agreement protocol from pairings
- An efficient protocol for authenticated key agreement
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
- Identity-based authenticated key agreement protocol based on Weil pairing
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Title not available (Why is that?)
Cited In (3)
Uses Software
This page was built for publication: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q507654)