Identity-based constant round group key exchange protocol via secret-share

被引:0
|
作者
Key Laboratory of Computer Networks and Information Security, Xidian University, No. 2 South TaiBai Road, Xi'an, Shaanxi 710071, China [1 ]
机构
来源
WSEAS Trans. Syst. | 2008年 / 1卷 / 7-16期
关键词
35;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Identity-Based Identity-Concealed Authenticated Key Exchange
    Lian, Huanhuan
    Pan, Tianyu
    Wang, Huige
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 651 - 675
  • [32] A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication
    Zhong Yantao
    Ma Jianfeng
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2010, 12 (06) : 592 - 599
  • [33] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [34] An efficient identity-based secret key management scheme for MANETs
    Zhang, Yong
    Qian, Hai-Feng
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
  • [35] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [36] An Identity-Based Group Key Agreement Protocol for Low-Power Mobile Devices
    TENG Jikai
    WU Chuankun
    ChineseJournalofElectronics, 2016, 25 (04) : 726 - 733
  • [37] An efficient pairing-free identity-based authenticated group key agreement protocol
    Tan, Zuowen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 534 - 545
  • [38] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [39] An Identity-Based Group Key Agreement Protocol for Low-Power Mobile Devices
    Teng Jikai
    Wu Chuankun
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (04) : 726 - 733
  • [40] Revocable Hierarchical Identity-Based Authenticated Key Exchange
    Okano, Yuki
    Tomida, Junichi
    Nagai, Akira
    Yoneyama, Kazuki
    Fujioka, Atsushi
    Suzuki, Koutarou
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 3 - 27