Two secure non-symmetric role Key-Agreement protocols

Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghoreishi, S., Isnin, I. F., Razak, S. A., Chizari, H.
Format: Article
Language:English
Published: Asian Research Publishing Network 2016
Subjects:
Online Access:http://eprints.utm.my/73748/
http://eprints.utm.my/73748/
http://eprints.utm.my/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!