Research on authenticated key agreement in group settings
Abstract
References
Index Terms
- Research on authenticated key agreement in group settings
Recommendations
Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
APCIP '09: Proceedings of the 2009 Asia-Pacific Conference on Information Processing - Volume 02Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the ...
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
Among the existing identity-based authenticated key agreement ID-AKA protocols, there are only a few of them that can resist to leakage of ephemeral secret keys, which is about the protection of the session secret key after the ephemeral secret keys of ...
Efficient provably secure password-based explicit authenticated key agreement
A password-based authenticated key agreement enables several parties to establish a shared cryptographically strong key over a public unreliable and insecure network using short low-entropy passwords. This authenticated key agreement is definitely ...
Comments
Information & Contributors
Information
Published In
Sponsors
- ACM: Association for Computing Machinery
- SCS: Shanghai Computer Society
- CCF: China Computer Federation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
- ACM
- SCS
- CCF
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 301Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in