Identity-based authenticated key agreement protocol for two-party in the standard model

被引:0
|
作者
Ren, Yong-Jun [1 ]
Wang, Jian-Dong [1 ]
Zhuang, Yi [1 ]
Wang, Jian [1 ]
Xu, Da-Zhuan [1 ]
机构
[1] College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:174 / 178
相关论文
共 50 条
  • [31] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Lunzhi Deng
    Jianxin Shao
    Zhenyu Hu
    Peer-to-Peer Networking and Applications, 2021, 14 : 2236 - 2247
  • [32] An optimal round two-party password-authenticated key agreement protocol
    Strangio, Maurizio A.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 216 - 223
  • [33] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Deng, Lunzhi
    Shao, Jianxin
    Hu, Zhenyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2236 - 2247
  • [34] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [35] Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security
    Gupta, Daya Sagar
    Ray, Sangram
    Singh, Tajinder
    Kumari, Madhu
    COMPUTER COMMUNICATIONS, 2022, 181 : 69 - 79
  • [36] Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme
    Hou, Mengbo
    Xu, Qiuliang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 440 - 444
  • [37] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings
    Zhang, Jianzhong
    Wu, Zuoshun
    Li, Yong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
  • [38] Escrowable identity-based authenticated key agreement protocol with strong security
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1339 - 1349
  • [39] Identity-based authenticated key agreement protocol cross autonomous domains
    Zhang, Xue
    Li, Guangsong
    Han, Wenbao
    Ji, Huifang
    Hu, Hongyu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2015, 47 (04): : 125 - 131
  • [40] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416