Identity-based constant round group key exchange protocol via secret-share

被引:0
|
作者
Key Laboratory of Computer Networks and Information Security, Xidian University, No. 2 South TaiBai Road, Xi'an, Shaanxi 710071, China [1 ]
机构
来源
WSEAS Trans. Syst. | 2008年 / 1卷 / 7-16期
关键词
35;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Identity-based key exchange protocols without Pairings
    Fiore D.
    Gennaro R.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 42 - 77
  • [42] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [43] A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    The Journal of Supercomputing, 2014, 69 : 395 - 411
  • [44] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [45] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Hongfeng Zhu
    Shuai Geng
    Wireless Personal Communications, 2019, 109 : 1911 - 1924
  • [46] On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access
    Jiang, J
    He, C
    Jiang, LG
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 972 - 981
  • [47] Identity-Based Inner Product Functional Encryption with Verified Secret Key
    Deng Y.-Q.
    Song G.
    Yang B.
    Peng C.-G.
    Tang C.-M.
    Wen Y.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (01): : 209 - 221
  • [48] Identity-based authenticated asymmetric group key agreement
    Tan, Yu'an, 1727, Science Press (51):
  • [49] Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing
    Olimid, Ruxandra E.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (04): : 1585 - 1590
  • [50] An Efficient Password-based Group Key Exchange Protocol Using Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 145 - 150