Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Enhanced ID-Based authenticated key agreement protocols for a multiple independent PKG environment
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Hi-index | 0.00 |
Recently, a number of ID-based authenticated key agreement protocols from bilinear pairings have been proposed. In this paper we present security analysis of four ID-based authenticated key agreement protocols from pairings proposed in [11, 12, 7, 18]. These results demonstrate that no more ID-based authenticated key agreement protocols should be constructed with such ad-hoc methods, i.e, the formal design methodology as in [1, 2, 3, 10] should be employed in future design.