Login / Signup
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
Atsushi Fujioka
Koutarou Suzuki
Berkant Ustaoglu
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
key agreement protocol
key distribution
key agreement
provably secure
secret key
key management
identity based encryption
diffie hellman
ciphertext
private key
public key
encryption scheme
signature scheme
hash functions
group communication
ad hoc networks
fault tolerant
lightweight