Two secure non-symmetric role Key-Agreement protocols

Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghoreishi, S., Isnin, I. F., Razak, S. A., Chizari, H.
Format: Article
Language:English
Published: Asian Research Publishing Network 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf
http://eprints.utm.my/id/eprint/73748/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.73748
record_format eprints
spelling my.utm.737482017-11-18T04:01:54Z http://eprints.utm.my/id/eprint/73748/ Two secure non-symmetric role Key-Agreement protocols Ghoreishi, S. Isnin, I. F. Razak, S. A. Chizari, H. QA75 Electronic computers. Computer science Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area. Asian Research Publishing Network 2016 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf Ghoreishi, S. and Isnin, I. F. and Razak, S. A. and Chizari, H. (2016) Two secure non-symmetric role Key-Agreement protocols. ARPN Journal of Engineering and Applied Sciences, 11 (5). pp. 3369-3374. ISSN 1819-6608 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ghoreishi, S.
Isnin, I. F.
Razak, S. A.
Chizari, H.
Two secure non-symmetric role Key-Agreement protocols
description Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area.
format Article
author Ghoreishi, S.
Isnin, I. F.
Razak, S. A.
Chizari, H.
author_facet Ghoreishi, S.
Isnin, I. F.
Razak, S. A.
Chizari, H.
author_sort Ghoreishi, S.
title Two secure non-symmetric role Key-Agreement protocols
title_short Two secure non-symmetric role Key-Agreement protocols
title_full Two secure non-symmetric role Key-Agreement protocols
title_fullStr Two secure non-symmetric role Key-Agreement protocols
title_full_unstemmed Two secure non-symmetric role Key-Agreement protocols
title_sort two secure non-symmetric role key-agreement protocols
publisher Asian Research Publishing Network
publishDate 2016
url http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf
http://eprints.utm.my/id/eprint/73748/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320
_version_ 1643656737300938752
score 13.159267