Login / Signup
Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings.
Kyungah Shim
Sungsik Woo
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
key agreement protocol
diffie hellman
key agreement
provably secure
key distribution
encryption scheme
key management
public key
secret key
elliptic curve
key exchange protocol
signature scheme
standard model
security model