[1] Shamir A. Identity based cryptosystems and signature schemes[C][J].CRYPTO84, Santa Barbara, California, USA, August 19-2.1984, LNCS 0196:47-53 [2] Boneh D and Franklin M. Identity based encryption from the Weil pairing [C][J].CRYPTO01, Santa Barbara, California, USA, August 19-2.2001, LNCS 2139:213-229 [3] Chen L and Kudla C. Identity based authenticated key agreement protocols from pairing[C]. 16th IEEE Security Foundations Workshop, Los Alamitos, CA, USA, June 30-July 2, 2003: 219-233. [4] McCullagh N and Barreto P S L M. A new two-party identity-based authenticated key agreement[C]. CT-RSA 2005, San Francisco, CA, USA, February 14-18, 2005, LNCS 3376: 262-274. [5] Cash D, Kiltz E, and Shoup V. The twin diffie-hellman problem and applications[C]. EUROCRYPT2008, Istanbul, Turkey, April 13-17, 2008, LNCS 4965: 127-145. [6] Huang Hai and Cao Zhen-fu. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem[C]. ASIACCS 2009, Sydney, Australia, March 10-12, 2009: 363-368. [7] Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels[C]. EUROCRYPT 2001, Innsbruck, Austria, May 6-10, 2001, LNCS 2045: 453-474. [8] LaMacchia B, Lauter K, and Mityagin A. Stronger security of authenticated key exchange[C]. ProvSec 2007, Wollongong, Australia, October 31-November 2, 2007, LNCS 4784: 1-16. [9] Ustaoglu B. Obtaining a secure and effcient key agreement protocol from (H)MQV and NAXOS[J].Designs, Codes and Cryptography.2008, 46(3):329-342 [10] Chow S S M and Choo K R. Strongly-secure identity-based key agreement and anonymous extension. Information Security, Volume 4779/2007, Springer Berlin Heidelberg, 203-220, 2007. Cryptology ePrint Archive, Report 2007/018. Full version of this paper (2007).
|