Two secure non-symmetric role Key-Agreement protocols
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network
2016
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf http://eprints.utm.my/id/eprint/73748/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.73748 |
---|---|
record_format |
eprints |
spelling |
my.utm.737482017-11-18T04:01:54Z http://eprints.utm.my/id/eprint/73748/ Two secure non-symmetric role Key-Agreement protocols Ghoreishi, S. Isnin, I. F. Razak, S. A. Chizari, H. QA75 Electronic computers. Computer science Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area. Asian Research Publishing Network 2016 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf Ghoreishi, S. and Isnin, I. F. and Razak, S. A. and Chizari, H. (2016) Two secure non-symmetric role Key-Agreement protocols. ARPN Journal of Engineering and Applied Sciences, 11 (5). pp. 3369-3374. ISSN 1819-6608 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ghoreishi, S. Isnin, I. F. Razak, S. A. Chizari, H. Two secure non-symmetric role Key-Agreement protocols |
description |
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area. |
format |
Article |
author |
Ghoreishi, S. Isnin, I. F. Razak, S. A. Chizari, H. |
author_facet |
Ghoreishi, S. Isnin, I. F. Razak, S. A. Chizari, H. |
author_sort |
Ghoreishi, S. |
title |
Two secure non-symmetric role Key-Agreement protocols |
title_short |
Two secure non-symmetric role Key-Agreement protocols |
title_full |
Two secure non-symmetric role Key-Agreement protocols |
title_fullStr |
Two secure non-symmetric role Key-Agreement protocols |
title_full_unstemmed |
Two secure non-symmetric role Key-Agreement protocols |
title_sort |
two secure non-symmetric role key-agreement protocols |
publisher |
Asian Research Publishing Network |
publishDate |
2016 |
url |
http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf http://eprints.utm.my/id/eprint/73748/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320 |
_version_ |
1643656737300938752 |
score |
13.159267 |