Security of Two-Party Identity-Based Key Agreement
Contribuinte(s) |
Dawson, E Vaudenay, S |
---|---|
Data(s) |
2005
|
Resumo |
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer Berlin Heidelberg |
Relação |
http://eprints.qut.edu.au/25354/1/Security_of_two_party_identity-based_key_agreement.pdf DOI:10.1007/11554868_17 Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243. |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080499 Data Format not elsewhere classified #089999 Information and Computing Sciences not elsewhere classified #Cryptographic Protocols, Provable Security, ID-Based Cryptography |
Tipo |
Journal Article |