Sciweavers

50 search results - page 1 / 10
» A New Two-Party Identity-Based Authenticated Key Agreement
Sort
View
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 4 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
MDAI
2005
Springer
14 years 4 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
IACR
2011
207views more  IACR 2011»
12 years 10 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
14 years 2 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
NDSS
2003
IEEE
14 years 4 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...