GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Li, Hui  (2)
  • English  (2)
Material
Person/Organisation
Language
  • English  (2)
Years
FID
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    SAGE Publications ; 2018
    In:  International Journal of Distributed Sensor Networks Vol. 14, No. 4 ( 2018-04), p. 155014771877254-
    In: International Journal of Distributed Sensor Networks, SAGE Publications, Vol. 14, No. 4 ( 2018-04), p. 155014771877254-
    Abstract: In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in vehicular ad hoc networks. Among the existing identity-based two-party authenticated key agreement protocols without pairings, there are only a few protocols that provide provable security in strong security models such as the extended Canetti–Krawczyk model. This article presents an efficient pairing-free identity-based one-round two-party authenticated key agreement protocol with provable security, which is more suitable for real-time application environments with highly dynamic topology such as vehicular ad hoc networks than the existing identity-based two-party authenticated key agreement protocols. The proposed protocol is proven secure under the passive and active adversaries in the extended Canetti–Krawczyk model based on the Gap Diffie–Hellman assumption. The proposed protocol can capture all essential security attributes including known-session key security, perfect forward secrecy, basic impersonation resistance, key compromise impersonation resistance, unknown key share resistance, no key control, and ephemeral secrets reveal resistance. Compared with the existing identity-based two-party authenticated key agreement protocols, the proposed protocol is superior in terms of computational cost and running time while providing higher security.
    Type of Medium: Online Resource
    ISSN: 1550-1477 , 1550-1477
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2018
    detail.hit.zdb_id: 2192922-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Elsevier BV ; 2010
    In:  Information Sciences Vol. 180, No. 23 ( 2010-12), p. 4672-4684
    In: Information Sciences, Elsevier BV, Vol. 180, No. 23 ( 2010-12), p. 4672-4684
    Type of Medium: Online Resource
    ISSN: 0020-0255
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2010
    detail.hit.zdb_id: 218760-7
    detail.hit.zdb_id: 1478990-5
    SSG: 24,1
    SSG: 7,11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...