Analysis and improvement of an ID-based authenticated key agreement protocol

被引:0
|
作者
Wang, Xiao-Fen [1 ,2 ]
Chen, Yuan [1 ]
Xiao, Guo-Zhen [1 ]
机构
[1] National Key Lab. of Integrated Service Networks, Xidian University, Xi'an 710071, China
[2] School of Computer Science and Technology, UESTC, Chengdu 610054, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:16 / 21
相关论文
共 50 条
  • [31] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [32] ID-based authenticated group key agreement from bilinear maps
    Xixiang Lv
    Hui Li
    Frontiers of Computer Science in China, 2010, 4 : 302 - 307
  • [33] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [34] ID-based tripartite key agreement protocol with pairings
    Liu, SG
    Zhang, FG
    Chen, KF
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 136 - 136
  • [35] ID-based authenticated group key agreement from bilinear maps
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 302 - 307
  • [36] ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 221 - 231
  • [37] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [38] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +
  • [39] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [40] Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
    Shim, K
    Woo, S
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (03) : 523 - 530