Several identity based and authenticated key agreement protocols have been proposed in recent years and all of them have been shown to be non-secure. It remains an open question to design secure identity based and authenticated key agreement protocols. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. A security model for identity based key agreement protocol is established and the security properties of IDAK are proved in this model with random oracle. In particular, it is shown that the IDAK protocol possesses all characteristics that a secure key agreement should have.
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
Key agreement allows multi-parties exchanging public information to create a common secret key that ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
Abstract. This paper introduces an ID based authenticated two pass key agreement protocol of Smart[4...
[[abstract]]For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy i...
In this paper, we present an identity-based explicit authenticated key agreement protocol that is pr...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
In this paper we propose an efficient single-round, two-party identity based authenticated key agree...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
Key agreement allows multi-parties exchanging public information to create a common secret key that ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
Abstract. This paper introduces an ID based authenticated two pass key agreement protocol of Smart[4...
[[abstract]]For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy i...
In this paper, we present an identity-based explicit authenticated key agreement protocol that is pr...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
In this paper we propose an efficient single-round, two-party identity based authenticated key agree...
In recent years, many identity-based key agreement protocols from pairings have been proposed. Howev...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
AbstractTwo-party authenticated key agreement protocols using pairings have gained much attention in...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
Key agreement allows multi-parties exchanging public information to create a common secret key that ...