Two provable secure ID-based group Key agreement protocols

被引:0
|
作者
Miao, Fang [1 ]
Liang, Jun [1 ,2 ]
Yoo, Hyeong Seon [2 ]
Wei, Wei [3 ]
机构
[1] Chengdu University of Technology, Chengdu 610059, China
[2] Inha University, Nam Ku 402751, Korea, Republic of
[3] Xi'an Jiaotong University, Xi'an 710049, China
来源
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1887 / 1892
相关论文
共 50 条
  • [21] An ID-based authenticated dynamic group key agreement with optimal round
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2542 - 2554
  • [22] Security analysis of an ID-based key agreement for peer group communication
    Vo, Duc-Liem
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (11) : 2624 - 2625
  • [23] ID-based authenticated group key agreement from bilinear maps
    Xixiang Lv
    Hui Li
    Frontiers of Computer Science in China, 2010, 4 : 302 - 307
  • [24] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [25] ID-based authenticated group key agreement from bilinear maps
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 302 - 307
  • [26] A flexible ID-based group key agreement protocol with bilinear pairings
    Liang, Jun
    Yoo, Hyeong Seon
    RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 325 - 328
  • [27] ID-based key agreement for multimedia encryption
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) : 298 - 303
  • [28] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [29] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988
  • [30] Two ID-based authenticated schemes with key agreement for mobile environments
    Chih-Ho Chou
    Kuo-Yu Tsai
    Chung-Fu Lu
    The Journal of Supercomputing, 2013, 66 : 973 - 988