科研成果详情

题名New identity-based three-party authenticated key agreement protocol with provable security
作者
发表日期2013
发表期刊Journal of Network and Computer Applications
ISSN/eISSN1084-8045
卷号36期号:2页码:927-932
摘要Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In the recent years, several identity-based (ID-based) authenticated key agreement protocols have been proposed and most of them broken. In this paper, we formalize the security model of ID-based authenticated tripartite key agreement protocol and propose a provably secure ID-based authenticated key agreement protocol for three parties with formal security proof under the computational Diffie-Hellman assumption. Experimental results by using the AVISPA tool show that the proposed protocol is secure against various malicious attacks. © 2012 Elsevier Ltd.
关键词Authentication Identity-based Information security Key agreement Provable security Three-party
DOI10.1016/j.jnca.2012.10.001
URL查看来源
语种英语English
Scopus入藏号2-s2.0-84874683457
引用统计
被引频次:13[WOS]   [WOS记录]     [WOS相关记录]
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/13537
专题个人在本单位外知识产出
通讯作者Xiong,Hu
作者单位
1.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,China
2.Key Laboratory of Network and Software Security Assurance,Peking University,Ministry of Education,Beijing,China
3.State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing,China
推荐引用方式
GB/T 7714
Xiong,Hu,Chen,Zhong,Li,Fagen. New identity-based three-party authenticated key agreement protocol with provable security[J]. Journal of Network and Computer Applications, 2013, 36(2): 927-932.
APA Xiong,Hu, Chen,Zhong, & Li,Fagen. (2013). New identity-based three-party authenticated key agreement protocol with provable security. Journal of Network and Computer Applications, 36(2), 927-932.
MLA Xiong,Hu,et al."New identity-based three-party authenticated key agreement protocol with provable security". Journal of Network and Computer Applications 36.2(2013): 927-932.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Xiong,Hu]的文章
[Chen,Zhong]的文章
[Li,Fagen]的文章
百度学术
百度学术中相似的文章
[Xiong,Hu]的文章
[Chen,Zhong]的文章
[Li,Fagen]的文章
必应学术
必应学术中相似的文章
[Xiong,Hu]的文章
[Chen,Zhong]的文章
[Li,Fagen]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。