Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem

被引:0
|
作者
Cao, Tian-Jie [1 ]
Lei, Hong [1 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:397 / 401
相关论文
共 50 条
  • [41] Conference key agreement protocol based on elliptic curve
    Cai, Yong-Quan
    Wang, Ya-Li
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2007, 33 (08): : 870 - 873
  • [42] Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem
    Huang, Li-Chin
    Hwang, Min-Shiang
    International Journal of Smart Home, 2013, 7 (01): : 9 - 18
  • [43] Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare
    Cho, Sunghyun
    Kim, Hyunsung
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (04) : 523 - 530
  • [44] Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
    Zhu, Dan
    Wang, Liwei
    Zhu, Hongfeng
    International Journal of Network Security, 2021, 23 (02): : 278 - 285
  • [45] Practical Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem
    Wu, Shuhua
    Kang, Fei
    Pu, Qiong
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 411 - 418
  • [46] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
    Usha, S.
    Kuppuswami, S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158
  • [47] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [48] Research on Key Management Scheme for WSN based on Elliptic Curve Cryptosystem
    Jiang Jian-wei
    Liu Jian-hui
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 536 - +
  • [49] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [50] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359