A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...
Saved in:
| Main Authors: | Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | The Scientific World Journal |
| Online Access: | http://dx.doi.org/10.1155/2014/367264 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
by: Yuh-Min Tseng, et al.
Published: (2015-05-01) -
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
by: Junghyun Nam, et al.
Published: (2014-01-01) -
Provably secure quantum resistance two-server password-authenticated key exchange protocol
by: Anqi YIN, et al.
Published: (2022-03-01) -
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
by: Kisung Park, et al.
Published: (2025-01-01) -
Reusable attribute-based signature with attribute revocation and authenticated key agreement
by: ZHANG Zhishuo, et al.
Published: (2024-04-01)