First Page | Document Content | |
---|---|---|
Date: 2003-12-20 20:23:11Finite fields Computational hardness assumptions Diffie–Hellman key exchange Key-agreement protocol Diffie–Hellman problem ID-based encryption XTR Key exchange Digital signature Cryptography Cryptographic protocols Public-key cryptography | ID-based Authenticated Two Round Multi-Party Key AgreementAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 114,70 KBShare Document on Facebook |