Two provable secure ID-based group Key agreement protocols

被引:0
|
作者
Miao, Fang [1 ]
Liang, Jun [1 ,2 ]
Yoo, Hyeong Seon [2 ]
Wei, Wei [3 ]
机构
[1] Chengdu University of Technology, Chengdu 610059, China
[2] Inha University, Nam Ku 402751, Korea, Republic of
[3] Xi'an Jiaotong University, Xi'an 710049, China
来源
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1887 / 1892
相关论文
共 50 条
  • [11] An ID-based conference key agreement protocol for secure network communications
    Chang, CC
    Lin, IC
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2002, 2 : 252 - 256
  • [12] A new ID-based group key agreement protocol for the network
    Xia, Meichen
    He, Mingxing
    Xie, Liyun
    Journal of Computational Information Systems, 2009, 5 (06): : 1855 - 1860
  • [13] Efficient ID-based group key agreement with bilinear maps
    Choi, KY
    Hwang, JY
    Lee, DH
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 130 - 144
  • [14] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [15] Anonymous ID-based group key agreement for wireless networks
    Wan, Zhiguo
    Ren, Kui
    Lou, Wenjing
    Preneel, Bart
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2615 - +
  • [16] Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Chow, Sherman S. M.
    Shi, Wenchang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 239 - 254
  • [17] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [18] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [19] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [20] An ID-based authenticated dynamic group key agreement with optimal round
    TENG JiKai1
    2Graduate University of Chinese Academy of Sciences
    3Faculty of Mathematic and Information Science
    ScienceChina(InformationSciences), 2012, 55 (11) : 2542 - 2554