Two proposed identity-based three-party authenticated key agreement protocols from pairings.
Marko HölblTatjana WelzerBostjan BrumenPublished in: Comput. Secur. (2010)
Keyphrases
- key agreement protocol
- key distribution
- provably secure
- key management
- diffie hellman
- signature scheme
- encryption scheme
- signcryption scheme
- standard model
- public key
- secret key
- fault tolerant
- group communication
- digital signature
- resource constrained
- key exchange protocol
- authentication protocol
- security model
- key exchange
- image quality
- elliptic curve
- end to end