Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Key Distribution Systems Based on Identification Information
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Identity-Based key agreement protocols in a multiple PKG environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Predicate-based authenticated key exchange resilient to ephemeral key leakage
WISA'10 Proceedings of the 11th international conference on Information security applications
Identity-based key exchange protocols without pairings
Transactions on computational science X
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
One-round identity-based key exchange with Perfect Forward Security
Information Processing Letters
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
An efficient ID-based authenticated key agreement protocol with pairings
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.