搜索结果: 1-5 共查到“ID-Based Authenticated Key”相关记录5条 . 查询时间(0.101 秒)
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
ID-based Authenticated key exchange BDH problem
2009/6/4
In this paper, we present a new ID-based two-party authen-
ticated key exchange (AKE) protocol, which makes use of a
new technique called twin Die-Hellman problem proposed
by Cash, Kiltz and Shoup...
Revisit of McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
McCullagh–Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
2009/4/3
The recently proposed two-party ID-based authenticated
key agreement protocols (with and without
escrow) and its variant resistant to key-compromise
impersonation by McCullagh & Barreto are revisit...
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
ID-based system bilinear pairing authenticated key agreement protocol
2009/3/10
Recently, a number of ID-based two-party authenticated key
agreement protocols which make of bilinear pairings have been proposed
[3, 8, 12, 11, 14]. In this paper, we show that the Xie’s protocol [...
A New Efficient ID-Based Authenticated Key Agreement Protocol
ID-Based Key Agreement Key Compromise Impersonation
2009/3/3
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo pro-
posed an efficient ID-based authenticated key agreement with paring[11].
They argued that it is secure and efficient. In this paper, we s...
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
Cryptanalytic Flaws ID-Based Authenticated Key Protocol
2008/5/23
A key agreement protocol is designed for two or more
entities to agree upon a shared secret key, which is used
to preserve confidentiality and data integrity over an open
network. In 2007, Oh et al...