Applied Cryptography and Network Security
From MaRDI portal
Publication:4680940
DOI10.1007/b98360zbMath1103.68508OpenAlexW4301861138MaRDI QIDQ4680940
Kenneth G. Paterson, Wenbo Mao, Colin A. Boyd
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Provably secure identity-based authenticated key agreement protocols with malicious private key generators, An improved two-party identity-based authenticated key agreement protocol using pairings, Efficient One-Round Key Exchange in the Standard Model, One-round identity-based key exchange with perfect forward security, An efficient dynamic authenticated key exchange protocol with selectable identities, Towards tight adaptive security of non-interactive key exchange, Non-Interactive Key Exchange, A Provably Secure One-Pass Two-Party Key Establishment Protocol, Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups