Security analysis of an ID-based key agreement for peer group communication

Cited 0 time in webofscience Cited 2 time in scopus
  • Hit : 3996
  • Download : 12160
DC FieldValueLanguage
dc.contributor.authorVo, DLko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2010-04-21T02:23:46Z-
dc.date.available2010-04-21T02:23:46Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2007-11-
dc.identifier.citationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E90A, pp.2624 - 2625-
dc.identifier.issn0916-8508-
dc.identifier.urihttp://hdl.handle.net/10203/17854-
dc.description.abstractPairing based cryptography has been researched intensively due to its beneficial properties. In 2005, Wu et al. [3] proposed an identity-based key agreement for peer group communication from pairings. In this letter, we propose attacks on their scheme, by which the group fails to agree upon a common communication key.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleSecurity analysis of an ID-based key agreement for peer group communication-
dc.typeArticle-
dc.identifier.wosid000251227200039-
dc.identifier.scopusid2-s2.0-68249156818-
dc.type.rimsART-
dc.citation.volumeE90A-
dc.citation.beginningpage2624-
dc.citation.endingpage2625-
dc.citation.publicationnameIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.identifier.doi10.1093/ietfec/e90-a.11.2624-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorVo, DL-
dc.type.journalArticleLetter-
dc.subject.keywordAuthorgroup key agreement-
dc.subject.keywordAuthorcryptanalysis-
dc.subject.keywordAuthorpairings-
dc.subject.keywordAuthorimpersonation attack-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0