Two secure non-symmetric role Key-Agreement protocols
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...
Saved in:
Main Authors: | Ghoreishi, S., Isnin, I. F., Razak, S. A., Chizari, H. |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network
2016
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf http://eprints.utm.my/id/eprint/73748/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A secure identity-based key agreement protocol without key-escrow
by: Ghoreishi, S. M., et al.
Published: (2017) -
A novel secure two-party identity-based authenticated key agreement protocol without bilinear pairings
by: Ghoreishi, S. M., et al.
Published: (2015) -
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings
by: Ghoreishi, S. M., et al.
Published: (2015) -
An efficient pairing-free certificateless authenticated two-party key agreement protocol over elliptic curves
by: Ghoreishi, S. M., et al.
Published: (2015) -
Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity
by: Ghoreishi, Seyedmohsen
Published: (2019)