An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
From MaRDI portal
Publication:884001
DOI10.1016/j.tcs.2007.02.021zbMath1120.68031OpenAlexW2072167671MaRDI QIDQ884001
Guomin Yang, Robert W. Zhu, Duncan S. Wong
Publication date: 13 June 2007
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2007.02.021
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption ⋮ An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries ⋮ Certificateless undeniable signature scheme ⋮ A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges ⋮ Strongly secure identity-based authenticated key agreement protocols without bilinear pairings ⋮ Strong Forward Security in Identity-Based Signcryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Protocols for authentification and key establishment
- Identity-Based Cryptosystems and Signature Schemes
- Identity-based authenticated key agreement protocol based on Weil pairing
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Topics in Cryptology – CT-RSA 2005
- Selected Areas in Cryptography
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004