Citation: | LI Yang, ZHU Jianming, ZHANG Ning, et al., “RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol,” Chinese Journal of Electronics, vol. 24, no. 2, pp. 332-337, 2015, doi: 10.1049/cje.2015.04.018 |
C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, Springer-Verlag, Berlin, Germany, pp.1-32, 2003.
|
N.P. Smart, “Identity-based authenticated key agreement protocol based on Weil pairing”, Electronics Letters, Vol.38, No.13, pp.630-632, 2002.
|
D. Boneh and M. Franklin,“Identity-based encryption from theWeil pairing”, Proc. of CRYPTO'01, Santa Barbara, California, USA, pp.213-229, 2001.
|
L. Chen and C. Kudla. “Identity based authenticated key agreement protocols from pairings”, Proc. of 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, USA, pp.219-213, 2003.
|
E.-K. Ryu, E.-J. Yoon and K.-Y. Yoo, “An efficient ID-based authenticated key agreement protocol from pairings”, Proc. of Networking'04, Athens, Greece, pp.1458-1463, 2004.
|
C. Boyd and K.-K.R. Choo, “Security of two-party identitybased key agreement”, Proc. of Mycrypt'05, Kuala Lumpur, Malaysia, pp.229-243, 2005.
|
S. Wang, Z. Cao and H. Bao, “Security of an efficient ID-based authenticated key agreement protocol from pairings”, Proc. of ISPA'05 Workshops, Nanjing, China, pp.342-349, 2005.
|
S. Wang, Z. Cao, K.-K.R. Choo and L. Wang, “An improved identity-based key agreement protocol and its security proof”, Information Sciences, Vol.179, No.3, pp.307-318, 2009.
|
J. Shen, S. Moh and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design”, Journal of Communications and Networks, Vol.14, No.6, pp.682-691, 2012.
|
H. Xiong, Z. Chen and F. Li, “New identity-based three-party authenticated key agreement protocol with provable security”, Journal of Network and Computer Applications, Vol.26, No.2, pp.927-932, 2013.
|
C. Boyd, Y. Cliff, J.G. Nieto and K.G. Paterson, “Efficient oneround key exchange in the standard model”, Proc. of ACISP'08, Wollongong, Australia, pp.69-83, 2008.
|
H. Huang and Z. Cao, “An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem”, Proc. of ASIACCS'09, Sydney, Australia, pp.333-342, 2009.
|
L. Chen, Z. Cheng and N.P. Smart, “Identity-based key agreement protocols from pairings”, International Journal of Information Security, Vol.6, No.4, pp.213-242, 2007.
|
P. S. Augustin, P. E. Vincent and J. C. Bajard, “A New security model for authenticated key agreement”, Proc. of SCN'10, Amalfi, Italy, pp.219-234, 2010.
|
S.S.-M. Chow and K.-K.R. Choo, “Strongly-secure identitybased key agreement and anonymous extension”, Proc. of ISC'07, Valparaíso, Chile, pp.203-220, 2005.
|
N. Liang, G. Chen, J. Li and Y. Hao, “Strongly secure identitybased authenticated key agreement protocols”, Computers & Electrical Engineering, Vol.37, No.2, pp.205-217, 2011.
|