2011
DOI: 10.1016/j.ins.2011.05.009
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 56 publications
(58 citation statements)
references
References 22 publications
0
58
0
Order By: Relevance
“…Bilinear maps are widely used in many cryptosystems, e.g., identitybased cryptography (IBC) [38] and group signature schemes [23]. We briefly review them here.…”
Section: Bilinear Mapsmentioning
confidence: 99%
“…Bilinear maps are widely used in many cryptosystems, e.g., identitybased cryptography (IBC) [38] and group signature schemes [23]. We briefly review them here.…”
Section: Bilinear Mapsmentioning
confidence: 99%
“…COMMUNICATION The emphasis of our paper is the agreement phase, so we next simply introduce the communication phase. We show a secure CCA2 public-key encryption scheme coming from [14] in Figure 4.…”
Section: Inmentioning
confidence: 99%
“…But the protocol in the [11] is only secure against passive adversaries who just eavesdrop the communication channel. In 2011, Zhang et al [14] proposed an authenticated ASGKA protocol that is proved to be secure against positive attack, but it is proved in the random oracle model and the efficiency is not well. Later, a series of protocols are proposed in [15], [13], but their security also need to improve.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, an active adversary who has control over the communication channel can mount a man-in-the-middle attack [11]. Authenticated KA [19,20] enables two or more parties to establish a shared session key over an insecure channel.…”
Section: Introductionmentioning
confidence: 99%