Electricity Consumption Information Transmission Protocol with ID-based Key Distribution Method
نویسندگان
چکیده
منابع مشابه
Maurer-Yacobi ID-Based Key Distribution Revisited
In 1984, Shamir first introduced the concept of ID-based cryptosystems [1]. Although various schemes have been proposed after his proposal, we may say that the only bilinear map based schemes [2], [3] are practical. In this letter, we examine the realizability of the other scheme: Maurer-Yacobi key distribution scheme [4]. In this scheme, a user’s private key is generated by solving Discrete Lo...
متن کاملAn Efficient ID-Based Authenticated Key Agreement Protocol with Pairings
In this paper, we describe a new ID-based authenticated key agreement protocol that makes use of bilinear pairings. We then discuss the security properties of our scheme, including known-key security, perfect forward secrecy and no key control. It is also able to withstand both passive and active attacks. An important advantage of our scheme is that it preserves the perfect forward secrecy even...
متن کاملAn ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure
The advantage of the ID-based authentication protocols over public-key based protocols is that authentication can be performed by simply knowing the identity of a party. Meanwhile, Public Key Infrastructure (PKI) provides a suite of excellent security and user management mechanisms that can be easily deployed to the Internet. In this paper, we present an ID-based proxy authentication protocol t...
متن کاملIEEE 1363.3 Submission: Implicitly Authenticated ID-Based Key Agreement Protocol
In this submission, we propose an efficient identity-based and implicitly authenticated key agreement protocol IDAK based on pairing techniques. Though both Weil and Tate pairing could be used for IDAK, we recommend Tate pairing for IDAK to avoid extra ephemeral value validation process. The security of IDAK was formally proved in [22] in Bellare-Rogaway model with random oracle. In additon, ID...
متن کاملA New Efficient Authenticated ID-Based Group Key Agreement Protocol
Group key agreement (GKA) protocols Play a main role in constructing secure multicast channels. These protocols are algorithms that describe how a group of parties communicating over a public network can gain a common secret key. ID-based authenticated group key agreement (AGKA) cryptosystems based on bilinear pairings are update researching subject because of the simplicity of their public key...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korea Navigation Institute
سال: 2012
ISSN: 1226-9026
DOI: 10.12673/jkoni.2012.16.4.709