ID-based Authenticated Key Agreement for Unbalanced Computing Environment |
Choi Kyu-young
(Center for Information Security Technology(CIST), Korea University)
Hwang Jung-yeon (Center for Information Security Technology(CIST), Korea University) Hong Do-won (Electronics and Telecommunications Research Institute(ETRI)) Lee Dong-hoon (Center for Information Security Technology(CIST), Korea University) |
1 | M. Bellare, P. Pointcheaval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks', Proc. of Eurocrypt' 00, LNCS 1807, pp.139-155, Springer-Verlag, 2000 |
2 | M. Bellare and P. Rogaway. 'Provably-Secure Session Key Distribution : The Three Party Case'. Proc. of STOC '95, pp. 57-66 |
3 | W. Diffie and M. Hellman, 'New Directions in Cryptography', IEEE Transactions on Information Theory 22(6), pp.644-654, 1976 DOI |
4 | S. D. Galbraith, K. Harrison and D. Soldera, 'Implementing the Tate pairing', Proc. of ANTS'02, LNCS 2369, pp.324-337, Springer- Verlag, 2002 |
5 | N. McCullagh and P. S. L. M. Barreto, 'Effcient and Foward-Secure Identity-Based Signcryption'. Cryptology ePrint Archive, Report 2004/117 |
6 | N.P.Smart, 'An Identity based authenticated Key Agreement protocol based on the Weil pairing', Electronics Letters, vol. 38 (13): 630--632, June 2002 DOI ScienceOn |
7 | P. S. L. M. Barreto, B. Lynn and M. Scott, 'Efficient implementation of pairing-based cryptosystems.', Journal of Cryptology, pp. 321-334, 2004 |
8 | J. Katz and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange', Proc. of Crypto 2003, LNCS 2729, pp.110-125, Springer-Verlag, 2003 |
9 | S. Mitsunari, R. Sakai and M. Kasahara, 'A new traitor tracing', Proc. of IEICE Trans. Vol. E85-A, No.2, pp.481-484, 2002 |
10 | M. Bellare and P. Rogaway, 'Entity authentication and key distribution'. Proc. of Crypto '93. pp.232-249 |
11 | D. Boneh and M. Franklin, 'Identity-based encryption from the Weil pairing', Proc. of Crypto '01, LNCS 2139, pp.213-229, Springer- Verlag, 2001 |
12 | A. Shamir, 'Identity Based Crypto-systems and Signature Schemes', Proc. of Crypto 1984, LNCS 0196, Springer-Verlag, 1984 |
13 | N. McCullagh and P. S. L. M. Barreto, 'A New Two-Party Identity-Based Authenticated Key Agreement', Proc. of CT-RSA'05, LNCS 3376, pp.262-274, Springer-Verlag, 2005 |
14 | D. Pointcheval and J. Stern, 'Security arguments for digital signatures and blind signatures', Journal. of Cryptology, Vol. 13, pp.361-396, 2000 DOI ScienceOn |
15 | F. Zhang, R. Safavi-Naini and W. Susilo, 'An Efficient Signature Scheme from Bilinear Pairings and Its Applications', Proc. of PKC '04, LNCS 2947, pp.277-290, Springer- Verlag, 2004 |
16 | J. Y. Hwang, S. M. Lee and D. H. Lee, 'Scalable key exchange trans-formation : from two-party to group', Electronics Letters. Vol. 40, No. 12, Jun. 2004 |
17 | D. Nalla and K. C. Reddy, 'ID-based tripartite Authenticated Key Agreement Protocols from pairings', Cryptology ePrint Archive, Report 2003/004 |
18 | H. J. Kim, S. M. Lee and D. H. Lee, 'Constant-Round Authenticated Gourp Key Exchange for Dynamic Groups', Proc. of Asiacrypt 2004, LNCS 3329, PP.245-259, Springer-Verlag, 2004 |
19 | E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, 'Mutual Athentication and Group Key Agreement for Low-Power Mobile Devices', In the 5th IEEE International Conference on Mobile and Wireless Communications Networks, 2003 |
20 | K. Y. Choi, J. Y. Hwang and D. H. Lee, 'Efficient ID-based Group Key Agreement with Bilinear Maps', Proc. of PKC '04, LNCS 2947, PP. 130-144, Springer-Verlag, 2004 |
21 | P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott, 'Efficient algorithms for pairing-based cryptosysterns'. Proc. of Crypto '02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002 |
22 | J. Nam, S. Kim and D. Won, 'Attacks on Bresson-Chevassut-Essiari-Pointchevals Group Key Agreement Scheme for Low-Power Mobile Devices', Proc. of IEEE Communications Letters, 2005 |
23 | Q. Huang, J. Cukier, H. Kobayashi, B. Liu and J. Zhang, 'Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks', In Proc. of WSNA '03, Copyright 2003 ACM |