Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols.
Xi Jun LinLin SunPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- key agreement protocol
- key distribution
- provably secure
- key management
- diffie hellman
- signature scheme
- encryption scheme
- signcryption scheme
- fault tolerant
- public key
- standard model
- security model
- group communication
- key exchange
- key exchange protocol
- secret key
- wireless sensor networks
- distributed systems
- ad hoc networks
- secret sharing scheme
- authentication protocol
- security analysis
- resource constrained
- security requirements
- image compression