Two secure non-symmetric role Key-Agreement protocols

Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghoreishi, S., Isnin, I. F., Razak, S. A., Chizari, H.
Format: Article
Language:English
Published: Asian Research Publishing Network 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf
http://eprints.utm.my/id/eprint/73748/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320
Tags: Add Tag
No Tags, Be the first to tag this record!