Security of Two-Party Identity-Based Key Agreement


Autoria(s): Boyd, Colin; Choo, Kim
Contribuinte(s)

Dawson, E

Vaudenay, S

Data(s)

2005

Resumo

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/25354/

Publicador

Springer Berlin Heidelberg

Relação

http://eprints.qut.edu.au/25354/1/Security_of_two_party_identity-based_key_agreement.pdf

DOI:10.1007/11554868_17

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080499 Data Format not elsewhere classified #089999 Information and Computing Sciences not elsewhere classified #Cryptographic Protocols, Provable Security, ID-Based Cryptography
Tipo

Journal Article