Strongly secure authenticated key agreement protocol using smart card

被引:0
|
作者
Li, Xiao-Wei [1 ]
Zhang, Yu-Qing [1 ,2 ]
Zhang, Ge-Fei [2 ]
Liu, Xue-Feng [1 ]
Fan, Dan [2 ]
机构
[1] The State Key Lab of ISN, Xidian University, Xi'an,Shaanxi,710071, China
[2] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing,100049, China
来源
关键词
Smart cards;
D O I
10.3969/j.issn.0372-2112.2014.08.020
中图分类号
学科分类号
摘要
引用
收藏
页码:1587 / 1593
相关论文
共 50 条
  • [31] A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
    Haiyan SUN
    Qiaoyan WEN
    Wenmin LI
    [J]. Science China(Information Sciences), 2016, 59 (03) : 107 - 122
  • [32] On Practical Deployment of Smart Card Based Authenticated Key Agreement Schemes
    Malina, Lukas
    Konecny, Jakub
    Dzurenda, Petr
    Hajny, Jan
    [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 277 - 282
  • [33] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [34] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    [J]. CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [35] Authenticated Key Agreement Protocol
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    [J]. CHINA COMMUNICATIONS, 2010, 7 (05) : 1 - 8
  • [36] A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 113 - 123
  • [37] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [38] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [39] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [40] Authenticated Key Agreement Protocol Based on Provable Secure Cryptographic Functions
    Kilciauskas, Ausrys
    Butkus, Gintaras
    Sakalauskas, Eligijus
    [J]. INFORMATICA, 2020, 31 (02) : 277 - 298