2013
DOI: 10.1080/00207160.2013.806653
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated asymmetric group key agreement based on certificateless cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
34
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(35 citation statements)
references
References 24 publications
1
34
0
Order By: Relevance
“…3.3), and proposed a concrete CL-AAGKA protocol which enables a group of user to establish a common encryption and their respective decryption keys in one round. Unlike the security model in [19], our model enables an attacker to obtain any decryption key of any user, except the decryption keys generated in the target session.…”
Section: Our Contributionmentioning
confidence: 95%
See 2 more Smart Citations
“…3.3), and proposed a concrete CL-AAGKA protocol which enables a group of user to establish a common encryption and their respective decryption keys in one round. Unlike the security model in [19], our model enables an attacker to obtain any decryption key of any user, except the decryption keys generated in the target session.…”
Section: Our Contributionmentioning
confidence: 95%
“…However, the formal security analysis of the protocol in [22] is not given. In [19], a certificateless AAGKA is presented together with a security proof. However, in the proof, an attacker cannot get any decryption key related to the target user, which implies that the known-key security property is not considered.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is unclear how to use this method without affecting the round efficiency of AGKA protocols. We note that AGKA was later extended to certificateless public key cryptosystems [15], [19], [22], which can be viewed as a variant of IBC. Nevertheless, no formal security analysis is given for the protocol in [19].…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, no formal security analysis is given for the protocol in [19]. The protocol in [15] is proven in a formal security model, but the knownkey security property is not modeled. The protocol in [22] is proposed with a formal security analysis.…”
Section: Related Workmentioning
confidence: 99%