Back to Results
First PageMeta Content
Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement


ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science
Add to Reading List

Document Date: 2008-12-04 01:09:45


Open Document

File Size: 269,20 KB

Share Result on Facebook

Company

KE / PrSA / /

Country

Australia / /

Event

FDA Phase / /

Facility

Risk Engineering University of Tsukuba / Science Victoria University / /

IndustryTerm

online fashion / online attacks / setup algorithm / online attack / secure protocols / secure protocol / insecure public network / large groups / cryptographic devices / online impersonation attack / online dictionary attacks / /

Organization

PAKE / School of Engineering / University of Tsukuba / Engineering and Science Victoria University / Melbourne / Diffie-Hellman / AKE / /

Person

Lee / Key Generator / Kim / Ai / /

Position

model for ID-based group / Private / /

Product

Franklin / M0 / M1 / /

ProvinceOrState

Victoria / /

Technology

encryption / Public Key Infrastructure / PPT algorithm / 3.2 Identity-Based Encryption / public key / key exchange protocol / 2-party Diffie-Hellman protocol / PKI / AKE protocols / Setup algorithm / identity-based encryption / provably secure protocols / private key / secret key / secure protocol / digital signature / Katz-Ostrovsky-Yung protocol / four algorithms / Burmester-Desmedt protocol / four randomized algorithms / considered extending the 2-party Diffie-Hellman protocol / /

SocialTag