Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Key distribution system for mail systems using ID-related information directory
Computers and Security
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
An Enhanced Authentication Key Exchange Protocol
AINA '03 Proceedings of the 17th International Conference on Advanced Information Networking and Applications
On the Security of an Enhanced Authentication Key Exchange Protocol
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Improved authentication key exchange protocol without using one-way hash function
ACM SIGOPS Operating Systems Review
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Computers and Electrical Engineering
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New directions in cryptography
IEEE Transactions on Information Theory
Social networking federation: A position paper
Computers and Electrical Engineering
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
Computers and Electrical Engineering
Hi-index | 0.00 |
Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the proposed protocol is provably secure in the random oracle model under the BDH assumptions. The proposed identity-based multiple key exchange protocol is secure in a formal security model under the random oracle model upon the CDH assumptions and the BDH assumptions. Compared with the identity-based multiple key exchange protocols in the literature, the proposed protocol is more efficient and holds stronger security.