Universiti Teknologi Malaysia Institutional Repository

Two secure non-symmetric role Key-Agreement protocols

Ghoreishi, S. and Isnin, I. F. and Razak, S. A. and Chizari, H. (2016) Two secure non-symmetric role Key-Agreement protocols. ARPN Journal of Engineering and Applied Sciences, 11 (5). pp. 3369-3374. ISSN 1819-6608

[img]
Preview
PDF
466kB

Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area.

Item Type:Article
Uncontrolled Keywords:Computational complexity, Elliptic curves, Identity-based, Key agreement
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:73748
Deposited By: Haliza Zainal
Deposited On:18 Nov 2017 04:01
Last Modified:18 Nov 2017 04:01

Repository Staff Only: item control page