scispace - formally typeset
Open AccessJournal ArticleDOI

Identity based authenticated key agreement from pairings

Hyang-Sook Lee, +1 more
- 01 Oct 2005 - 
- Vol. 20, Iss: 4, pp 849-859
TLDR
A new identity based authenticated key agreement protocol from pairings satisfying the required security attributes is presented, based on the bilinear Di-e-Hellman assumption.
Abstract
We present a new identity based authenticated key agreement protocol from pairings satisfying the required security attributes. The security of our protocol is based on the bilinear Di-e-Hellman assumption.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Certificateless public key cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Journal ArticleDOI

Identity-based key agreement protocols from pairings

TL;DR: In this article, the authors present a method incorporating a built-in decisional function into the protocols, which transfers a hard decisional problem in the proof to an easy decisional problems.
Posted Content

Identity-based Key Agreement Protocols From Pairings.

TL;DR: This paper presents a method incorporating a built-in decisional function into the protocols, and discusses the resulting efficiency of the schemes and the relevant security reductions, in the random oracle model, inThe context of different pairings one can use.
Book ChapterDOI

A new two-party identity-based authenticated key agreement

TL;DR: In this paper, a new two-party identity-based key agreement scheme was proposed, which is inspired by the key pair derivation algorithm first proposed by Sakai and Kasahara.
Journal ArticleDOI

On cryptographic protocols employing asymmetric pairings — The role of Ψ revisited

TL;DR: In this article, the authors argue that Type 2 pairings are merely inefficient implementations of Type 3 pairings, and appear to offer no benefit for protocols based on asymmetric pairings from the point of view of functionality, security, and performance.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI

Short Signatures from the Weil Pairing

TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.