A Certificateless Noninteractive Key Exchange Protocol with Provable Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Certificateless Proxy Ring Signature Scheme with Provable Security

Proxy ring signature allows proxy signer to sign messages on behalf of the original signer while providing anonymity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003. In certificateless cryptography, it does not require the use of certificates to guarantee the authenticity of users’ public keys. Meanwhile, certificateless cryptography doe...

متن کامل

Provable Efficient Certificateless Public Key Encryption

Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Recently, Dae Hyun Yum1 and Pil Joong Lee have proposed a generic series construction model of certificateless public key encryption (CL-PKE) which is built from generic primitives:...

متن کامل

Provable Secure Encrypted Key Exchange Protocol Under Standard Model

Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password. Most existing encrypted key exchange protocols either lack security proofs or rely on the Random Oracle model. Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier com...

متن کامل

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security

Recent years, lots of efforts have been devoted to construct secure schemes in certificateless cryptography which eliminates the key escrow problem in identity-based cryptography. However, most of them are designed in traditional certificateless cryptography which suffers from the single-point problem. Hierarchical cryptography exploits a practical security model to mirror the organizational hi...

متن کامل

Security Analysis of a Multi-factor Authenticated Key Exchange Protocol

This paper shows several security weaknesses of a MultiFactor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS’08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal model, Pointcheval and Zimmer formally proved that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2020

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2020/8862476