Back to Results
First PageMeta Content
Lion-reclining / Hand / Vulture / Stool-or-mat / Quail chick / Foot / Jar stand / Viper / Cryptography / Egyptian hieroglyphs / Cryptographic protocols / XTR


Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin ∗and Lin Sun †
Add to Reading List

Document Date: 2013-12-15 08:56:00


Open Document

File Size: 82,08 KB

Share Result on Facebook

City

Let / Qingdao / Several Identity / /

Company

H(UA )SA / TEA sA / Computer Sciences / TBA sA / IDC / /

Country

China / /

/

Event

FDA Phase / /

Facility

College of Liberal Arts / Ocean University of China / Qingdao University / /

IndustryTerm

tripartite key agreement protocol / probabilistic polynomial-time interactive algorithm / insecure network / identity-based tripartite authenticated key-agreement protocol / identity-based authenticated key agreement protocols / secure cryptographic protocol / security services / round protocol / additive / tripartite authenticated key agreement protocols / identity-based tripartite authenticated key agreement protocols / authenticated key agreement protocol / identity-based tripartite authenticated key agreement protocol / agreement protocol / multiplicative / polynomialtime algorithms / public key-based tripartite protocols / /

NaturalFeature

TB waterfall / TC waterfall / TA waterfall / /

Organization

Department of Computer Sciences and Technology / College of Liberal Arts / Ocean University of China / Qingdao University / /

Person

Gq / Lin Sun / Forward Secrecy / Jun Lin / /

Product

Round1 / Round2 / H2 / /

Technology

three polynomialtime algorithms / public key-based tripartite protocols / secure cryptographic protocol / public key / ID-based tripartite authenticated key agreement protocols / identity-based authenticated key agreement protocols / identity-based tripartite authenticated key-agreement protocol / three identity-based tripartite authenticated key agreement protocols / improved protocol / probabilistic polynomial-time interactive algorithm / key agreement protocol / identity-based tripartite authenticated key agreement protocol / private key / secret key / three tripartite authenticated key agreement protocols / authenticated key agreement protocol / one round protocol / tripartite key agreement protocol / /

URL

http /

SocialTag