Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Identity-based key agreement protocols from pairings
International Journal of Information Security
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Identity-based key agreement with unilateral identity privacy using pairings
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Information Sciences: an International Journal
A new scheme for protecting master-key of data centre web server in online banking
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Hi-index | 0.00 |
It is often a challenging task to make a system satisfy desirable security properties and maintain a low computational overhead. In this paper, we attempt to minimize the gap for two identity-based key agreement protocols, in the sense that we allow our key agreement protocols to satisfy all general desirable security properties including master-key forward security and in the meanwhile achieve a good computational efficiency. Our protocols are novel, since we are able to make use of several nice algebraic properties of the Weil Pairing to outperform other state-of-the-art key agreement protocols. To our knowledge, our second protocol is the first identity-based protocol that provides master key forward security and satisfies all basic desirable security properties based on the key extraction algorithm due to Sakai and Kasahara.