The use of bilinear pairings as a building block for cryptographic protocols, most notably in the construction of identity-based cryptosystems, is a very popular area of cryptographic research. In this thesis, we provide a novel classification of pairing-based group key agreement (GKA) from current literature. We propose a new framework for constructing secure and efficient computationally asymmetric authenticated GKA protocols from identity-based signcryption schemes and adapt this framework to construct a novel identity-based authenticated GKA protocol with perfect forward secrecy. To the best of our knowledge, our protocol is the first that maintains perfect forward secrecy in the presence of auxiliary key agreement protocols. We formall...
A signature scheme is called structure-preserving if its verification keys, messages, and sig-nature...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...
Several identity-based key agreement protocols using bilinear pairing have been proposed in recent y...
Abstract. In identity-based public-key cryptography, an entity’s public key can be easily derived fr...
[[abstract]]Recently, several identity (ID)-based authenticated group key exchange (IDAGKE) protocol...
One-round group authenticated key exchange (GAKE) protocols typically provide implicit authenticatio...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
[[abstract]]In practice, we usually require a key agreement protocol to establish a common secret ke...
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing t...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Abstract We present a provably secure tree based authenticated group key agreement protocol in dynam...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract—We advance the state-of-the-art in automated sym-bolic cryptographic protocol analysis by p...
A signature scheme is called structure-preserving if its verification keys, messages, and sig-nature...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...
Several identity-based key agreement protocols using bilinear pairing have been proposed in recent y...
Abstract. In identity-based public-key cryptography, an entity’s public key can be easily derived fr...
[[abstract]]Recently, several identity (ID)-based authenticated group key exchange (IDAGKE) protocol...
One-round group authenticated key exchange (GAKE) protocols typically provide implicit authenticatio...
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasibl...
[[abstract]]In practice, we usually require a key agreement protocol to establish a common secret ke...
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing t...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Abstract We present a provably secure tree based authenticated group key agreement protocol in dynam...
Several identity based and authenticated key agreement protocols have been proposed in recent years ...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract—We advance the state-of-the-art in automated sym-bolic cryptographic protocol analysis by p...
A signature scheme is called structure-preserving if its verification keys, messages, and sig-nature...
In recent years, a large number of identity-based key agreement protocols from pairings have been p...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primi...