Identity based authenticated key agreement protocols from pairings

@article{Chen2002IdentityBA,
  title={Identity based authenticated key agreement protocols from pairings},
  author={Liqun Chen and Caroline Kudla},
  journal={16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.},
  year={2002},
  pages={219-233}
}
We investigate a number of issues related to identity based authenticated key agreement protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues include how to make protocols efficient; to avoid key escrow by a Trust Authority (TA) who issues identity based private keys for users, and to allow users to use different TAs. We describe a few authenticated key agreement (AK) protocols and AK with key confirmation (AKC) protocols by modifying Smart's AK protocol… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 157 CITATIONS, ESTIMATED 93% COVERAGE

Certificateless Authenticated Two-Party Key Agreement Protocols

VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Securing SDN Southbound and Data Plane Communication with IBC

  • Mobile Information Systems
  • 2016
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids

  • IEEE Transactions on Industrial Electronics
  • 2014
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Efficient cluster-based group key agreement protocols for wireless ad hoc networks

  • J. Network and Computer Applications
  • 2011
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Improved TLS Handshake Protocols Using Identity-Based Cryptography

  • 2009 International Symposium on Information Engineering and Electronic Commerce
  • 2009
VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2003
2019

CITATION STATISTICS

  • 30 Highly Influenced Citations