Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
スポンサーリンク
概要
- 論文の詳細を見る
This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.
- 2008-12-01
著者
-
Yu Yong
School Of Computer Science And Engineering University Of Electronic Science And Technology Of China
-
SUN Rong
State Key Lab. of Integrated Service Networks, Xidian Univ.
-
Sun Rong
State Key Lab Of Isn Xidian University
-
CAO Xuefei
State Key Lab. of Integrated Service Networks, Xidian Univ.
-
KOU Weidong
State Key Lab. of Integrated Service Networks, Xidian Univ.
-
Cao Xuefei
State Key Lab. Of Integrated Service Networks Xidian Univ.
-
Kou Weidong
State Key Lab. Of Integrated Service Networks Xidian Univ.
関連論文
- Trace Representation of a New Class of Sextic Residue Sequences of Period p≡3 (mod 8)
- Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
- On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation
- Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
- Parity-Check Matrix Extension to Lower the Error Floors of Irregular LDPC Codes
- A Construction of Binary Cyclotomic Sequences Using Extension Fields
- Semi-Irregular LDPC Codes Used in MBC(Wireless Communication Technologies)
- Sensor-based probabilistic roadmaps: experiments with an eye-in-hand system
- Lowering Error Floors of Irregular LDPC Codes by Combining Construction and Decoding
- Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)
- Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)
- Dynamic Bubble-Check Algorithm for Check Node Processing in Q-Ary LDPC Decoders
- Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
- Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices
- Linear Transmitter Precoding Design with Matching Weighted SLNR for Multiuser MIMO Downlink Systems
- Iterative Decoding for the Davey-MacKay Construction over IDS-AWGN Channel
- Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
- On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model