Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Identity-based key agreement protocols from pairings
International Journal of Information Security
A survey of key management schemes in wireless sensor networks
Computer Communications
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
On Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
Information Sciences: an International Journal
An efficient identity-based blind signature scheme without bilinear pairings
Computers and Electrical Engineering
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Toward pairing-free certificateless authenticated key exchanges
ISC'11 Proceedings of the 14th international conference on Information security
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
An ID-based proxy multi signature scheme without bilinear pairings
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Information Sciences: an International Journal
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences: an International Journal
On the security of an improved password authentication scheme based on ECC
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
An efficient and provably-secure certificateless signature scheme without bilinear pairings
International Journal of Communication Systems
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
COMPASS: authenticated group key agreement from signcryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.07 |
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided.