In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primitives including key agreement. However, recently researchers have shown an increased interest in Pairing-Free cryptography because of high computational cost of Bilinear Pairings. In this study, we could propose a new two-party pairing-free identity-based authenticated key agreement protocol over elliptic curve based algebraic groups. We could show that beside of supporting security requirements of key agreement protocols, our proposed protocol could overcome to the inherent problem of identity-based cryptosystems named key escrow. In addition, performance of our proposed protocol is improved from complexity of computation perspective in comp...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
The use of bilinear pairings as a building block for cryptographic protocols, most notably in the co...
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asy...
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic g...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received wide...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
AbstractRecently, Cao et al. proposed an identity-based pairing-free two-party authenticated key agr...
Due to the importance of key in providing secure communication, various Key Agreement protocols have...
Several identity-based key agreement protocols using bilinear pairing have been proposed in recent y...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
The use of bilinear pairings as a building block for cryptographic protocols, most notably in the co...
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asy...
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic g...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use ...
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received wide...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using ellip...
AbstractRecently, Cao et al. proposed an identity-based pairing-free two-party authenticated key agr...
Due to the importance of key in providing secure communication, various Key Agreement protocols have...
Several identity-based key agreement protocols using bilinear pairing have been proposed in recent y...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
The use of bilinear pairings as a building block for cryptographic protocols, most notably in the co...
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asy...