Recently, He et al. (Computers and Mathematics with Applications, 2012, 64(6): 1914-1926) proposed a new efficient certificateless two-party authenticated key agreement protocol. They claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. In this paper, we will show that their protocol is insecure. A type I adversary, who obtains one party\u27s ephemeral private key, can impersonate the party to cheat the other party and compute the shared session key successfully. For overcoming this weakness, we also propose a simple countermeasure
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curv...
Certificateless cryptography eliminates the need of certificacates in the public key crytosystems an...
Recently, He et al. [D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreeme...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
AbstractSince certificateless public key cryptography (CLPKC) has received widespread attention due ...
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow pro...
Abstract. We show that the YAK protocol does not provide the joint key control attribute, and is vul...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing fe...
The Canetti--Krawczyk (CK) and extended Canetti--Krawczyk (eCK) security models, are widely used to ...
AbstractRecently, Cao et al. proposed an identity-based pairing-free two-party authenticated key agr...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
In traditional digital signature schemes, certificates signed by a trusted party are required to ens...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curv...
Certificateless cryptography eliminates the need of certificacates in the public key crytosystems an...
Recently, He et al. [D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreeme...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
AbstractSince certificateless public key cryptography (CLPKC) has received widespread attention due ...
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow pro...
Abstract. We show that the YAK protocol does not provide the joint key control attribute, and is vul...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
In [3] Al-Riyami and Paterson introduced the notion of Certificateless Public Key Cryptography and...
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing fe...
The Canetti--Krawczyk (CK) and extended Canetti--Krawczyk (eCK) security models, are widely used to ...
AbstractRecently, Cao et al. proposed an identity-based pairing-free two-party authenticated key agr...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
In traditional digital signature schemes, certificates signed by a trusted party are required to ens...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
This thesis introduces the concept of certificateless public key cryptography (CLPKC). Elliptic curv...
Certificateless cryptography eliminates the need of certificacates in the public key crytosystems an...