Insider Impersonation Attack on a Tripartite ID-Based Authenticated Key Agreement Protocol with Bilinear Pairings (original) (raw)
Related papers
2003
ID-based tripartite Authenticated Key Agreement Protocols from pairings
2003
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences, 2012
Efficient identity-based authenticated key agreement protocol from pairings
Applied Mathematics and Computation, 2005
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
Informatica (slovenia), 2009
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Computers & Electrical Engineering, 2010
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces, 2009
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings
2014 International Symposium on Biometrics and Security Technologies (ISBAST), 2014
A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing
Int. J. Netw. Secur., 2019
Identity-based Signcryption Groupkey Agreement Protocol Using Bilinear Pairing
Informatica (Slovenia), 2017
Vulnerability of two multiple-key agreement protocols
ID-based tripartite key agreement with signatures
2003
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)
Comments on the Secure Identity-Typed Bilinear Pairing Scheme
Mohammad Al-fayoumi, Sattar Aboud
Weakness of Shim's new ID-based tripartite multiple-key agreement protocol
WSEAS Transactions on Information …, 2006
Provably secure and efficient certificateless authenticated tripartite key agreement protocol
Mathematical and Computer Modelling - MATH COMPUT MODELLING
A New Two-Party Identity-Based Authenticated Key Agreement
2005
ID-Based Tripartite Key Agreement with Signature
2003
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
International Journal of Information and Education Technology, 2013
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Informatica
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
2011
Improved Two-Party ID-Based Authenticated Key Agreement Protocol
Improving Choi et al.'s ID-based Authenticated Group Key Agreement Scheme at PKC2004
2008
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05, 2005
An IBE Scheme to Exchange Authenticated Secret Keys
2004
An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment
International Journal of Communication Systems, 2017
A pairing-free certificateless authenticated key agreement protocol
International Journal of Communication Systems, 2012