Sciweavers

28 search results - page 1 / 6
» Enhancements of authenticated multiple key exchange protocol...
Sort
View
44
Voted
CEE
2010
66views more  CEE 2010»
14 years 10 months ago
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...
83
Voted
CCS
2009
ACM
15 years 11 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
EUROPKI
2004
Springer
15 years 3 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ACISP
2005
Springer
15 years 3 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
ISCI
2010
146views more  ISCI 2010»
14 years 7 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...