<--- Back to Details
First PageDocument Content
Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2003-12-20 20:23:11
Finite fields
Computational hardness assumptions
Diffie–Hellman key exchange
Key-agreement protocol
Diffie–Hellman problem
ID-based encryption
XTR
Key exchange
Digital signature
Cryptography
Cryptographic protocols
Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 114,70 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

DocID: 1rn34 - View Document

Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

DocID: 1qZ4T - View Document

Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qQ53 - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qey3 - View Document

Cryptography / Public-key cryptography / Key management / Internet privacy / Transport Layer Security / Secure messaging / Threema / ID-based encryption / Man-in-the-middle attack / Email encryption / Key exchange / WhatsApp

2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†

DocID: 1q7RY - View Document