Sciweavers

Share
6 search results - page 1 / 2
» Group Oriented Identity-based Deniable Authentication Protoc...
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
9 years 11 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
COCOON
2010
Springer
10 years 4 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
ICPADS
2005
IEEE
10 years 5 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
10 years 3 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
IACR
2016
44views Biometrics» more  IACR 2016»
4 years 8 months ago
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Secret handshakes (SH) scheme is a key agreement protocol between two members of the same group. Under this scheme two members share a common key if and only if they both belong t...
Preeti Kulshrestha, Arun Kumar
books