Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
An Enhanced Authentication Key Exchange Protocol
AINA '03 Proceedings of the 17th International Conference on Advanced Information Networking and Applications
Improved authentication key exchange protocol without using one-way hash function
ACM SIGOPS Operating Systems Review
New directions in cryptography
IEEE Transactions on Information Theory
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Computers and Electrical Engineering
Provably secure and efficient identification and key agreement protocol with user anonymity
Journal of Computer and System Sciences
Analysis and improvement of an authenticated multiple key exchange protocol
Computers and Electrical Engineering
Vulnerability of two multiple-key agreement protocols
Computers and Electrical Engineering
Efficient identity-based authenticated multiple key exchange protocol
Computers and Electrical Engineering
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
Computers and Electrical Engineering
Hi-index | 0.00 |
Menezes et al. developed an MQV key exchange protocol that does not use a one-way hash function in 1995. Harn-Lin and Hwang-Shiau-Lai later respectively proposed efficient authenticated key exchange protocols. Lee and Wu recently proposed an enhanced authentication key exchange protocol to solve the drawbacks of the Hwang-Shiau-Lai protocol. Based on the Lee-Wu protocol, this work presents two new authenticated multiple key exchange protocols based on ECC and bilinear pairing. The proposed ECC-based protocol is more efficient than the Harn-Lin, Hwang-Shiau-Lai, and Lee-Wu protocols. Moreover, the proposed pairing-based protocol is better than other protocols in terms of the number of available shared session keys because all agreed session keys can be adopted by the communicating parties in the protocol.