References
- W. Diffie and M. Hellman, 'New Direction in Cryptography,' In IEEE Transaction of Information Theory, Volume 22, pp. 664-654, 1976
- A. Menezes, M. Qu, and S. Vanstone, 'Some New Key Agreement Protocols Providing Mutual Implicit Authentications,' 2nd Workshop on Selected Areas in Cryptography (SAC '95), pp. 22-32, 1995
- 이성운, 유기영, '간단하고 효율적인 상호 인증키 동의 프로토콜', 한국정보보호학회논문지 제13권 제1호, pp. 105-113, 2003
- A. Shamir, 'Identity-based Cryptosystems and Signature Scheme,' CRYPTO '84, LNCS Volume 196, pp. 47-53, Springer-Verlag, 1984
- G. Gunther, 'An Identity-based Key exchange Protocol,' EUROCRYPT '89, LNCS Volume 434, pp. 29-37, Springer -Verlag, 1990
- H. Sakazaki, E. Okamoto, and M. Mambo, 'Constructing Identity-based Key Distribution Systems over Elliptic Curves,' IEICE TRANS. Fundamentals, Volume E81-A, pp. 2138-2143, 1998
- 박영호, 박호상, 정수환, 'ECDSA를 적용한 ID 기반의 사용자 인증 및 키 교환 프로토콜', 한국정보보호학회논문지 제12권 제1호, pp. 3-10, 2002
- D. Boneh and M. Franklin, 'Identity- based Encryption from Weil Pairing,' CRYPTO '01, LNCS Volume 2139, pp. 213-229, Springer-Verlag, 2001
- 김동현, 김상진, 오희국, 구본석, 유권호, '동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델', 한국정보보호학회 논문지 제15권 제2호, pp. 23-37, 2005
- N. Smart, 'An Identity-based Authenticated Key Agreement Protocol Based on Weil Pairing,' In Electronic Letters, Volume 38, pp.630-632, 2002 https://doi.org/10.1049/el:20020387
- L. Chen and C. Kudla, 'Identity- based Authenticated Key Agreement Protocols from Pairings,' In Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219-233, IEEE Computer Society Press, 2003
- L. Chen and C. Kudla, 'Identity- based Authenticated Key Agreement Protocols from Pairings,' Cryptology ePrint Archive, Reoprt 2002/184, 2004
- N. McCullagh, and P. Barreto, 'A New Two-Party Identity-Based Authenticated Key Agreement,' Cryptology ePrint Archive, Report 2004/122, 2004
- A. Joux, 'A One Round Protocol for Tripartite Diffie-Hellman,' ANTS-IV, LNCS Volume 1838, pp. 385-394, Spinger-Verlag, 2000
- S. S. Al-Riyami and K. G. Patterson, 'Tripartite Authenticated Key Agreement Protocols from Pairings,' In IMA Conference on Cryptography and Coding, LNCS Volume 2898, pp. 332- 359, Spinger-Verlag, 2003
- F. Zhang, S. Liu, K. Kim, 'ID-Based One Round Authenticated Tripartite Key Agreement Protocols with Pairings,' Crypology ePrint Archive, Report 2002/122, 2002
- D. Nalla and K. Reddy, 'ID-Based tripartite Authenticated Key Agreement Protocols from Pairings,' Cryptology ePrint Archive, Report 2003/ 04, 2003
- Z. Chen, 'Security Analysis on Nalla- Reddy's ID-Based Tripartite Key Agreement Protocols,' Cryptology ePrint Archive, Report 2003/103, 2003
- K. Shim, 'Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols,' Cryptology ePrint Archive, Report 2003/115, 2003
- 박영호, 이경현, '효율성을 개선한 신원기반의 3자간 복수 키 합의 프로토콜', 한국정보보호학회논문지 제15권 제3호, pp. 77-89, 2005
- A. Menezes, T. Okamoto, and S. Vanstone, 'Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field,' In IEEE Transaction of Information Theory, Volume 39, pp. 1639-1646, 1993 https://doi.org/10.1109/18.259647
- G. Frey and H. Ruck, 'A Remark Concerning m-divisibility and The Discrete Logarithm in the Divisor class Group of Curves,' Mathematics of Computation, Volume 62, pp. 865- 874, 1994 https://doi.org/10.2307/2153546
- R. Dutta, R. Barua, P. Sarkar, 'Pairing-Based Cryptography : A Survey,' Cryptology ePrint Archive, Report 2004/064. 2004