Security of Two-Party Identity-Based Key Agreement
Author(s) -
Colin Boyd,
KimKwang Raymond Choo
Publication year - 2005
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-28938-0
DOI - 10.1007/11554868_17
Subject(s) - computer science , identity (music) , computer security , key (lock) , cryptography , id based cryptography , public key cryptography , internet privacy , encryption , key distribution , physics , acoustics
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom