Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number.

作者: Mike Scott

DOI:

关键词:

摘要: … Token based schemes are often based on expensive (and irreplaceable) smart-card tokens, while password-only schemes require that a unique password is shared between every pair …

参考文章(14)
Steven D. Galbraith, Supersingular Curves in Cryptography international conference on the theory and application of cryptology and information security. pp. 495- 513 ,(2001) , 10.1007/3-540-45682-1_29
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott, Constructing elliptic curves with prescribed embedding degrees international workshop on security. pp. 257- 267 ,(2002) , 10.1007/3-540-36413-7_19
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott, On the Selection of Pairing-Friendly Groups Selected Areas in Cryptography. pp. 17- 25 ,(2004) , 10.1007/978-3-540-24654-1_2
Chae Hoon Lim, Pil Joong Lee, A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp international cryptology conference. pp. 249- 263 ,(1997) , 10.1007/BFB0052240
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing international conference on the theory and application of cryptology and information security. pp. 514- 532 ,(2001) , 10.1007/3-540-45682-1_30
Atsuko Miyaji, Shunzou Takano, Masaki Nakabayashi, New Explicit Conditions of Elliptic Curve Traces for FR-Reduction IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 84, pp. 1234- 1243 ,(2001)
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521
E. Okamoto, Proposal for identity-based key distribution systems Electronics Letters. ,vol. 22, pp. 1283- 1284 ,(1986) , 10.1049/EL:19860880
Eric R. Verheul, Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems theory and application of cryptographic techniques. pp. 195- 210 ,(2001) , 10.1007/3-540-44987-6_13