{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:10Z","timestamp":1725565330917},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_72","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T21:14:08Z","timestamp":1284153248000},"page":"672-680","source":"Crossref","is-referenced-by-count":3,"title":["ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings"],"prefix":"10.1007","author":[{"given":"Kee-Won","family":"Kim","sequence":"first","affiliation":[]},{"given":"Eun-Kyung","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"72_CR2","unstructured":"Menezes, A.J., Qu, M., Vanstone, S.A.: Some Key Agreement Protocols Providing Implicit Authentication. In: 2nd Workshop Selected Area in Cryptography, SAC 1995, pp. 22\u201332 (1995)"},{"key":"72_CR3","unstructured":"IEEE P1363Working Group, IEEE P1363a D10 (Draft version 10): Standard Specifications for Public Key Cryptography: Additional Techniques, IEEE P1363 Working Group, Working draft ( ) (2001), (available from http:\/\/grouper.ieee.org\/groups\/1363 )"},{"key":"72_CR4","unstructured":"Harn, L., Lin, H.Y.: An Authenticated Key Agreement Protocol without Using One-way Function. In: Proceedings of 8th National Conference Information Security, pp. 155\u2013160 (1998)"},{"issue":"10","key":"72_CR5","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1049\/el:20010441","volume":"37","author":"L. Harn","year":"2001","unstructured":"Harn, L., Lin, H.-Y.: Authenticated Key Agreement without Using One-way Hash Functions. Electronics Letters\u00a037(10), 229\u2013630 (2001)","journal-title":"Electronics Letters"},{"key":"72_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0920-5489(02)00004-1","volume":"24","author":"Y.-M. Tseng","year":"2002","unstructured":"Tseng, Y.-M.: Robust Generalized MQV Key Agreement Protocol without Using One-way Hash Functions. Computer Standards and Interfaces\u00a024, 241\u2013246 (2002)","journal-title":"Computer Standards and Interfaces"},{"key":"72_CR7","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/S0920-5489(03)00072-2","volume":"25","author":"Z. Shao","year":"2003","unstructured":"Shao, Z.: Security of Robust Generalized MQV Key Agreement Protocol Without Using One-way Hash Functions. Computer Standards and Interfaces\u00a025, 431\u2013436 (2003)","journal-title":"Computer Standards and Interfaces"},{"key":"72_CR8","unstructured":"Hwan, R.-J., Shiau, S.-H., Lai, C.-H.: An Enhanced Authentication Key Exchange Protocol. In: Proceedings of the 17th International Conference on Advanced Information Networking and Applications, AINA 2003, pp. 202\u2013205 (2003)"},{"key":"72_CR9","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/S0096-3003(02)00741-5","volume":"147","author":"H.-Y. Chien","year":"2004","unstructured":"Chien, H.-Y., Jan, J.-K.: Improved Authenticated Multiple-key Agreement Protocol Without Using Conventional One-way Function. Applied Mathematics and Computation\u00a0147, 491\u2013497 (2004)","journal-title":"Applied Mathematics and Computation"},{"key":"72_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"4","key":"72_CR11","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/49.17709","volume":"7","author":"S. Tsuji","year":"1989","unstructured":"Tsuji, S., Itoh, T.: An ID-based Cryptosystem Based on the Discret Logarithm Problem. IEEE Journal of Selected Areas in Communications\u00a07(4), 467\u2013473 (1989)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"72_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"72_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residus. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"issue":"13","key":"72_CR14","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: Identity-based Authnticated Key Agreement Protocol Based on Weil Pairing. Electronics Letters\u00a038(13), 630\u2013632 (2002)","journal-title":"Electronics Letters"},{"key":"72_CR15","unstructured":"Al-Riyami, S., Paterson, K.G.: Authenticated Three Party Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2002\/035 (2002), available at http:\/\/eprint.iacr.org\/2002\/035\/"},{"key":"72_CR16","unstructured":"Zhang, F., Liu, S., Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. Cryptology ePrint Archive, Report 2002\/122 (2002), available at http:\/\/eprint.iacr.org\/2002\/122\/"},{"key":"72_CR17","unstructured":"Nalla, D., Reddy, K.C.: ID-based Tripartite Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003\/004 (2003), available at http:\/\/eprint.iacr.org\/2003\/004\/"},{"issue":"8","key":"72_CR18","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K. Shim","year":"2003","unstructured":"Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol Based on Weil Pairing. Electronics Letters\u00a039(8), 653\u2013654 (2003)","journal-title":"Electronics Letters"},{"issue":"2","key":"72_CR19","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1049\/el:20030168","volume":"39","author":"X. Yi","year":"2003","unstructured":"Yi, X.: Efficient ID-based Key Agreement from Weil Pairing. Electronics Letters\u00a039(2), 206\u2013208 (2003)","journal-title":"Electronics Letters"},{"key":"72_CR20","unstructured":"Nalla, D.: ID-based Tripartite Key Agreement with Signatures. Cryptology ePrint Archive, Report 2003\/144 (2003), available at http:\/\/eprint.iacr.org\/2003\/144\/"},{"key":"72_CR21","series-title":"Lecture Notes in Computer Science","first-page":"310","volume-title":"Cryptography and Coding","author":"S. Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 310\u2013324. Springer, Heidelberg (1997)"},{"key":"72_CR22","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L. Law","year":"2003","unstructured":"Law, L., Menezes, A.J., Qu, M., Solinas, J., Vanstone, S.: An Efficient Protocol for Authenticated Key Agreement. Designs, Codes and Cryptography\u00a028, 119\u2013134 (2003)","journal-title":"Designs, Codes and Cryptography"},{"key":"72_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient Identity based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"key":"72_CR24","doi-asserted-by":"crossref","unstructured":"Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology\u00a0(13), 361\u2013396 (2000)","DOI":"10.1007\/s001450010003"},{"key":"72_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-44987-6_13","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"E.R. Verheul","year":"2001","unstructured":"Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 195\u2013210. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_72.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:55:54Z","timestamp":1605743754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_72","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}