The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anonymity of user is an important property in the cryptographic protocol, to protect the privacy of the participants. In this paper, we propose a new primitive, fully anonymous signcryption, which provide anonymity of both sender and receiver along with the advantage of traditional ring signcryption (only provides anonymity of sender) scheme. We also construct a fully anonymous identity-based signcryption...
In this paper, we present a two-party identity-based key agreement protocol, which is provably secure without random oracles under three static assumptions. It is inspired on a new identity-based encrypt system proposed in TCC 2010 by Lewko and Waters. We show how this key agreement can be used in either escrowed or escrowless mode. We also modify the protocol in the escrow to provide perfect forward...
At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature,...
Key agreement protocols are essential for secure communications in open and distributed environment. The study of tripartite key agreement has great theoretical and practical significance. Shim and Woo pointed out that the four tripartite authenticated key agreement protocols proposed by Al-Riyami and Paterson were insecure. Modifying the communication messages, an active adversary is able to calculate...
In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Key escrow is essential in situations where confidentiality and audit trail are legal requirements, whilst perfect forward secrecy and known session-specific temporary information...
Secure and reliable group communication is an active area of research. The central research challenge is secure and efficient group key management. While centralized methods are often based on Diffie-Hellman key exchange. Our work investigates a novel group key agreement approach which blends key trees based on identity. It yields a secure protocol suite that is both simple and fault-tolerant. Each...
Authenticated key agreement protocol is an important primitive for establishing session key to provide secure communications in open and distributed environment. Key escrow is essential in situations where confidentiality and audit trail are legal requirements, whilst perfect forward secrecy is desirable to provide stronger security. i.e. the adversary couldn't acquire the past session keys even the...
In this paper, we present a two-party attribute-based key agreement protocol, which is secure in random oracle model under the Bilinear Diffe-Hellman assumption. It is inspired by a fuzzy identity-based encryption scheme first proposed by Sahai and Waters. The attribute-based key agreement scheme is a new type of identity-based key agreement scheme, in which we can view identity as a set of descriptive...
Authenticated key agreement protocol is the fundamental building block for secure communication in the open network to ensure authentication and confidentiality of e-commerce and e-government applications. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party...
As the fundamental building block for secure communication in the open network, authenticated key agreement protocols are usually constructed in the public key setting. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party authenticated key agreement protocol...
Key agreement protocols are essential for secure communications in open and distributed environments. Identity-based cryptography has become extremely fashionable in the last few years for its special advantages. In this paper, we point out some flaw in the scheme proposed by Wang et al., then we present a two-party identity-based explicit authenticated key agreement protocol with key confirmation,...
To provide secure communications in open and distributed environments, authenticated key agreement protocol is an important primitive for establishing session key. So far, great deals of identity-based protocols have been proposed to provide robust mutual authentication and key establishment in two-party setting. Majority of the existing escrowable identitybased key agreement protocols, however, only...
Authenticated key agreement (AK) protocol is crucial in providing data confidentiality and integrity for subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional public key cryptography (PKC). Unfortunately, construction of CL-PKC and...
Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement...
Authenticated key agreement protocol is one of the important cryptographic primitives to ensure secure communication in an open network. Certificateless public key cryptography (CL-PKC) represents an interesting and potentially useful balance between public key cryptography based on certificates and identity-based cryptography. The topic of CL-PKC has undergone quite rapid development with schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.