The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs

X Liu, Y Wang, Y Li, H Cao - Computer Networks, 2023 - Elsevier
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be
improved through message interaction and sharing between vehicle users, which inevitably …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[HTML][HTML] An efficient certificateless two-party authenticated key agreement protocol

D He, S Padhye, J Chen - Computers & Mathematics with Applications, 2012 - Elsevier
Since certificateless public key cryptography (CLPKC) has received widespread attention
due to its efficiency in avoiding key escrow problems in identity-based public key …

Strongly secure certificateless key exchange without pairing

G Yang, CH Tan - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In certificateless cryptography, a user secret key is derived from two partial secrets: one is
the identity-based secret key (corresponding to the user identity) generated by a Key …

[PDF][PDF] 无证书公钥密码体制研究

张福泰, 孙银霞, 张磊, 耿曼曼, 李素娟 - 软件学报, 2011 - jos.org.cn
无证书公钥密码体制研究 Page 1 软件学报ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2011,22(6):1316−1332 [doi: 10.3724/SP.J.1001.2011.04007] http://www.jos.org.cn …

[HTML][HTML] A new two-round certificateless authenticated key agreement protocol without bilinear pairings

D He, Y Chen, J Chen, R Zhang, W Han - Mathematical and Computer …, 2011 - Elsevier
Certificateless public key cryptography (CLPKC), which can simplify the complex certificate
management in the traditional public key cryptography and resolve the key escrow problem …

A certificateless authenticated key agreement scheme for the power IoT

W Cui, R Cheng, K Wu, Y Su, Y Lei - Energies, 2021 - mdpi.com
Power Internet of Things (IoT) is the application of IoT technology in the field of power grid,
which can better control all kinds of power equipment, power personnel and operating …

Leakage-resilient certificate-based authenticated key exchange protocol

TT Tsai, SS Huang, YM Tseng… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate
management in traditional public key systems and avoids the key escrow problem in identity …

A study of two-party certificateless authenticated key-agreement protocols

C Swanson, D Jao - Progress in Cryptology-INDOCRYPT 2009: 10th …, 2009 - Springer
We survey the set of all prior two-party certificateless key agreement protocols available in
the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of …