Abstract. This paper introduces an ID based authenticated two pass key agreement protocol of Smart[4] which used the Weil pair-ing. We propose other an ID based authenticated two pass key agreement protocol which using the Tate Pairing. We will compare protocol of Smart with this protocol. 1
[[abstract]]"Harn and Lin proposed an authenticated key agreement without using one-way hash functio...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Yao G, Feng DG. Pairwise key agreement protocols based on the weil pairing. Journal of Software, 200...
[[abstract]]We propose a group key agreement protocol in this paper. The key agreement protocol is a...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented a...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
[[abstract]]"Harn and Lin proposed an authenticated key agreement without using one-way hash functio...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Yao G, Feng DG. Pairwise key agreement protocols based on the weil pairing. Journal of Software, 200...
[[abstract]]We propose a group key agreement protocol in this paper. The key agreement protocol is a...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented a...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
[[abstract]]"Harn and Lin proposed an authenticated key agreement without using one-way hash functio...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...