Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem

被引:0
|
作者
Cao, Tian-Jie [1 ]
Lei, Hong [1 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:397 / 401
相关论文
共 50 条
  • [31] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [32] An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
    Li, Xuelei
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2013, 23 (05) : 311 - 324
  • [33] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [34] Public-key cryptosystem based on elliptic curve isogenies
    Hu, Jin
    He, De-Biao
    Chen, Jian-Hua
    Huang, Yin
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2011, 37 (06): : 916 - 920
  • [35] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [36] Authenticated public-key encryption based on elliptic curve
    Han, YL
    Yang, XY
    Hu, YP
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 424 - 431
  • [37] An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    COMPUTERS & SECURITY, 2009, 28 (3-4) : 138 - 143
  • [38] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [39] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [40] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610