{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:18Z","timestamp":1725496578058},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77092-3_29","type":"book-chapter","created":{"date-parts":[[2007,11,24]],"date-time":"2007-11-24T07:59:32Z","timestamp":1195891172000},"page":"333-345","source":"Crossref","is-referenced-by-count":4,"title":["ID-Based Key Agreement with Anonymity for Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Hung-Yu","family":"Chien","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A.. Shamir","year":"1985","unstructured":"Shamir, A.: Identity Based on Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"29_CR3","first-page":"57","volume-title":"27th ACM Symposium on the Theory of Computing","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: 27th ACM Symposium on the Theory of Computing, pp. 57\u201366. ACM Press, New York (1995)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","first-page":"451","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 451\u2013472. Springer, Heidelberg (2001)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"issue":"5","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G. Frey","year":"1999","unstructured":"Frey, G., Muller, M., Ruck, H.: The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystem. IEEE Trans. on I.T.\u00a045(5), 1717\u20131719 (1999)","journal-title":"IEEE Trans. on I.T."},{"issue":"4","key":"29_CR9","first-page":"185","volume":"13","author":"H.Y. Chien","year":"2006","unstructured":"Chien, H.Y.: ID-Based Tripartite Multiple Key Agreement Protocol Facilitating Computer Auditing and Transaction Refereeing. Journal of Information Management\u00a013(4), 185\u2013204 (2006)","journal-title":"Journal of Information Management"},{"key":"29_CR10","first-page":"415","volume":"21","author":"K.H. Rhee","year":"2005","unstructured":"Rhee, K.H., Park, Y.H., Tsudik, G.: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. Journal of Information Science and Engineering\u00a021, 415\u2013428 (2005)","journal-title":"Journal of Information Science and Engineering"},{"key":"29_CR11","unstructured":"Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2002\/184 (2002)"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.adhoc.2004.03.011","volume":"3","author":"M. Bohio","year":"2004","unstructured":"Bohio, M., Miri, A.: Efficient Identity-Based Security Schemes for Ad Hoc Network Routing Protocols. Ad Hoc Networks\u00a03, 309\u2013317 (2004)","journal-title":"Ad Hoc Networks"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad Hoc Networks. Computer Communications\u00a023, 1627\u20131637 (2000)","journal-title":"Computer Communications"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Kaya, T., Lin, G., Noubir, G., Yilmaz, A.: Secure Multicast Groups on Ad Hoc Networks. In: Proc. of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 94\u2013102 (2003)","DOI":"10.1145\/986858.986872"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.comcom.2003.10.005","volume":"27","author":"V. Varadharajan","year":"2004","unstructured":"Varadharajan, V., Shankaran, R., Hitchens, M.: Security for Cluster Based Ad Hoc Networks. Computer Communications\u00a027, 488\u2013501 (2004)","journal-title":"Computer Communications"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.comnet.2004.11.023","volume":"48","author":"B. Zhu","year":"2005","unstructured":"Zhu, B., Bao, F., Deng, R.H., Kankanhalli, M.S., Wang, G.: Efficient and Robust Key Management for Large Mobile Ad Hoc Networks. Computer Networks\u00a048, 657\u2013682 (2005)","journal-title":"Computer Networks"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-hoc Networks. In: Proc. of the 2003 Symp. on Applications and the Internet Workshop (2003)","DOI":"10.1109\/SAINTW.2003.1210183"},{"issue":"1","key":"29_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.adhoc.2006.07.006","volume":"6","author":"H.Y. Chien","year":"2008","unstructured":"Chien, H.Y., Lin, R.Y.: Improved ID-Based Security Framework for Ad-hoc Networks. Ad Hoc Networks\u00a06(1), 47\u201360 (2008)","journal-title":"Ad Hoc Networks"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/3-540-44987-6_16","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"A.R. Sadeghi","year":"2001","unstructured":"Sadeghi, A.R., Steiner, M.: Assumptions Related to Discrete Logarithms: Why Subtleties make a Difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 243\u2013260. Springer, Heidelberg (2001)"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing. Electronics Letters\u00a038, 630\u2013632 (2002)","journal-title":"Electronics Letters"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Chen, L., Harrison, K., Soldera, D., Smart, N.: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. HP Journal (Feburary 2003)","DOI":"10.1007\/3-540-45831-X_18"},{"key":"29_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"29_CR23","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems Based on Pairing. In: the 2000 Symp. On Cryptography and Security (SCIS 2000), Japan, 26-28 (2000)"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77092-3_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:59:07Z","timestamp":1619521147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77092-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770916"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77092-3_29","relation":{},"subject":[]}}