Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Boyd, C., & Choo, K. K. R. (2005). Security of two-party identity-based key agreement. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3715 LNCS, pp. 229–243). https://doi.org/10.1007/11554868_17
Mendeley helps you to discover research relevant for your work.