|
[1]M. Abe, and T. Okamoto, “Delegation Chains Secure up to Constant Length,” IEICE Trans. Fundamentals, Vol. E85-A, No. 1, pp. 110-116, 2002.[2]R. J. Anderson, and T. M. A. Lomas, “Fortifying Key Negotiation Schemes with Poorly Chosen Passwords,” Electronics Letters, Vol. 30, No. 13, pp. 1040-1041, 1994.[3]S. M. Bellovin, and M. Merritt, “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks,” Proceedings 1992 IEEE Computer Society Conf. Research in Security and Privacy, pp. 72-84, 1992.[4]D.E.R. Denning, Cryptography and Data Security. Addison-Wesley, Reading, Mass., 1982.[5]W. Diffie, and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976.[6]T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory 31 (4), pp. 469-472, 1985.[7]D. M. Gordon, “Discrete logarithms using the number field sieve,” Preprint, 28 Mar. 1991.[8]C. G. Gunther, “An identity-based key exchange protocol,” Advances in Cryptology — Eurocrypt ‘89, Springer-Verlag, New York, pp. 29-37, 1989.[9]H. Ghodosi H., and S. Saeednia, “Modification to Self-certified Group-oriented Cryptosystem without Combiner,” Electronics Letters, Vol. 37, No. 2, pp. 1453-1454, 2001.[10]B. T. Hsieh, H. M. Sun, T. Hwang, “Cryptanalysis of enhancement for simple authentication key agreement algorithm,” Electronics Letters, Vol. 38, No. 1, pp. 20-21, 2002.[11]D. Knuth, The Art of Computer Programming: Volume 2 Seminumerical Algorithms, 2nd edition, Addison-Wesley, Chapter 4.5.2, Theorem D, pp. 324, 1981.[12]W. C. Ku, and S. D. Wang, “Cryptanalysis of modified authenticated key agreement protocol,” Electronics Letters, Vol. 36, No. 21, pp. 1770-1771, 2000.[13]B. A. LaMacchia, and A.M. Odlyzko, “Computation of discrete logarithms in prime fields,” Designs, Codes, and Cryptography, Vol. 1, pp. 46-62, 1911.[14]C. H. Lim and P. J. Lee, “Modified Maurer-Yacobi’s scheme and its application,” in: Proc. Auscrypt’92, pp. 308-323.[15]I. C. Lin, C. C. Chang, and M. S. Hwang, “Security Enhancement for the Simple Authentication Key Agreement Algorithm,” COMPSAC 2000. The 24th Annual International, pp. 113 -115, 2000.[16]W. B. Lee, and C.C. Chang, “On key changeable ID-Based digital signature scheme,” Journal of Information Science and Engineering, Vol. 12, No. 3, pp. 381-386, 1996.[17]A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of applied cryptography,” CRC Press, Inc., 1996.[18]T. Matsumoto, H. lmai, “On the key predistribution system,” Advances in Cryptology — Eurocrpt ’89, Springer-Verlag, New York, pp.29-37.[19]U. M. Maurer, Y. Yacobi, “A remark on a noninteractive public-key distribution system,” in: Proc. Eurocrpt ’92, pp. 458-460, 1993.[20]U. M. Maurer, Y.Yacobi, “A non-interactive public-key distribution system,” Designs, Codes Cryptography 9 (3) 1996, pp. 305-316.[21]U. M. Maurer, Y. Yacobi, “Non-interactive public key cryptography,” Advances in Cryptology — Eurocrypt ’91, Springer-Verlag, Now Youk, pp.498-507, 1991.[22]National Institute of Standards and Technology, NIST FIPS PUB 186, “Digital Signature Standard,” U.S. Department of Commerce, 1994.[23]E. Okamoto, and K. Tanaka, “Identity-based information Security Management for personal computer networks,” IEEE J. Selected Areas Commun., Vol. 7, No. 2, pp. 290-294, 1989.[24]E. Okamoto, and K. Tanaka, “Key distribution system based on identification information,” IEEE J. Selected Areas Commun. Vol. 7, No. 4, 481-485, 1989.[25]A. Shamir, “Identity-based cryptosystem and signature schemes,” Advances in Cryptology — Crypto ’84, Springer-Verlag, New York, pp. 47-53.[26]A. Shamir, “How to share a secret,” Commun. ACM. 22:612-613, 1979.[27]C. P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, Vol. 4, No. 3, pp. 161-174, 1991.[28]D. Seo, and P. Sweeney, “Simple authenticated key agreement algorithm,” Electronics Letters, Vol. 35, No. 13, pp. 1073-1074, 1999.[29]H. Sun, “On the security of simple authenticated key agreement algorithm,” Proceedings of the Management Theory Workshop’2000, 2000.[30]S. Saryazdi, “An extension to ElGamal public key cryptosystem with a new signature scheme,” Communication, Control, and Signal Processing, Elsevier, pp. 194-198, 1990.[31]S. Saeednia, and H. Ghodosi, “A self-certified group-oriented cryptosystem without a combiner,” in PIEPRZYK, J., SAFAVI-NAINI, R., and SEBERY, J. (Eds.): Proc. ACISP ’99 — Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, (Spring-Verlag, 1999), Vol. 1587, pp. 192-201.[32]W. SUSILO, and R. SAFAVI-NAINI, “Remark on Self-Certified Group-Oriented Cryptosystem without Combiner,” Electronics Letters, Vol.35, No.18, pp. 1539-1540, 1999.[33]H. Tanaka, “A realization scheme for the identity-based cryptosystem,” in Proc. Crypto’87, pp. 340-349.[34]Y. M. Tseng, and J. K. Jan, “ID-based cryptographic schemes using a non-interactive public-key distribution system,” The 14th Annual Computer Security Applications Conference, pp. 237-243, 1998.[35]Y. W. Tsai, and T. Hwang, “ID-based public key cryptosystems based on Okamoto and Tanaka’s ID-based one Way communication scheme,” Electron. Letters, Vol. 26, No. 10, pp. 666-668, 1990.[36]S. Tsujii, J. Chao, and K. Araki, “A simple ID-based for key sharing,” IEEE J. Selected Areas Commun., Vol. 11, No. 5, pp. 730-734, 1993.[37]S. Tsujii, and T. Itoh, K. Kurosawa, “ID-based cryptosystem using discrete logarithm problem,” Electron, Letters, Vol. 23, pp. 1318-1320, 1987.[38]Y. M. Tseng, “Weakness in simple authenticated key agreement protocol,” Electronics Letters, Vol. 36, No. 1, pp. 48-49, 2000.[39]A. L. Wells Jr., “A polynomial form for logarithms modulo a prime,” IEEE Transactions on Information Theory, pp. 845-846, 1984.
|