Security of two-party identity-based key agreement

60Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Boyd, C., & Choo, K. K. R. (2005). Security of two-party identity-based key agreement. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3715 LNCS, pp. 229–243). https://doi.org/10.1007/11554868_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free