2012
DOI: 10.17487/rfc6539
|View full text |Cite
|
Sign up to set email alerts
|

IBAKE: Identity-Based Authenticated Key Exchange

Abstract: Cryptographic protocols based on public-key methods have been traditionally based on certificates and Public Key Infrastructure (PKI) to support certificate management. The emerging field of Identity-Based Encryption (IBE)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Directed path based authentication scheme (DPAS) [6], (d). Session key based authentication [10], (e). Two way authentication [7], (f).…”
Section: Introductionmentioning
confidence: 99%
“…Directed path based authentication scheme (DPAS) [6], (d). Session key based authentication [10], (e). Two way authentication [7], (f).…”
Section: Introductionmentioning
confidence: 99%
“…Need for secure channel has been eliminated between user and KGC. Not secured against unregistered identity attack 5 Identity Based Authenticated Key Exchange [27] Identity Based signcryption (IBSC) Scheme [29] Confidentiality and Authentication No Yes…”
Section: Survey On Existing Ibs Security Systems Based On Variousmentioning
confidence: 99%
“…In order to achieve the integrity protection, IBAKE method also provides mutual authentication with perfect forward and backward secrecy. The sequence work of IBAKE is defined in RFC 6539 [8] that described how key exchange and encryption-decryption mechanism are performed using standard of Boneh-Franklin [9] and Boneh-Boyen [10]. Currently, they are also proposing in detail how to carry IBAKE messages using EAP in the on progressing work [11].…”
Section: Related Workmentioning
confidence: 99%
“…The sequence work of IBAKE is defined in RFC 6539 [8] that described how key exchange and encryption-decryption mechanism are performed using standard of Boneh-Franklin [9] and Boneh-Boyen [10]. Currently, they are also proposing in detail how to carry IBAKE messages using EAP in the on progressing work [11]. In conclusion, IBAKE is a potential security protocol for mutual authentication and privacy preserving.…”
Section: Related Workmentioning
confidence: 99%