Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.
Zhaohui ChengLiqun ChenRichard ComleyQiang TangPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- key agreement
- security properties
- identity management
- key distribution
- secret key
- mutual authentication
- diffie hellman
- encryption scheme
- key management
- signature scheme
- security analysis
- key agreement protocol
- personal information
- authentication protocol
- privacy preserving
- elliptic curve
- privacy protection
- security requirements
- formal model
- access control
- private information
- security services
- sensitive information
- security protocols
- ciphertext
- cloud computing
- cryptographic protocols
- smart card
- group communication
- rfid tags
- authentication scheme
- third party
- standard model
- distributed systems
- provably secure
- trusted third party
- credit card
- multi party