Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of Identity-Based and Certificateless cryptosystems have been published. The pairing-free Key Agreement protocols could improve the efficiency by eliminating the high expense of pairing maps. In this paper, we proposed several secure and efficient Identity-Based and Certificateless pairing-free two party Key Agreement protocols. In compare with related works, our protocols require less computational cost
In this paper we propose an efficient single-round, two-party identity based authenticated key agree...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curv...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received wide...
Due to the importance of key in providing secure communication, various Key Agreement protocols have...
Key agreement protocols play a vital role in maintaining security in many critical applications due ...
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic g...
AbstractSince certificateless public key cryptography (CLPKC) has received widespread attention due ...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Recently, He et al. [D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreeme...
In this paper we propose an efficient single-round, two-party identity based authenticated key agree...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curv...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received wide...
Due to the importance of key in providing secure communication, various Key Agreement protocols have...
Key agreement protocols play a vital role in maintaining security in many critical applications due ...
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic g...
AbstractSince certificateless public key cryptography (CLPKC) has received widespread attention due ...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Recently, He et al. [D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreeme...
In this paper we propose an efficient single-round, two-party identity based authenticated key agree...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curv...