Pages that link to "Item:Q5189448"
From MaRDI portal
The following pages link to Making the Diffie-Hellman Protocol Identity-Based (Q5189448):
Displaying 16 items.
- One-round identity-based key exchange with perfect forward security (Q436613) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- Certificateless public key encryption: a new generic construction and two pairing-free schemes (Q627164) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Identity-based encryption from the Diffie-Hellman assumption (Q1675739) (← links)
- An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (Q2216128) (← links)
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings (Q2282019) (← links)
- Efficient hierarchical identity-based authenticated key agreement protocol (Q2951369) (← links)
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction (Q2953795) (← links)
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol? (Q3634337) (← links)
- Authenticated Key Exchange with Entities from Different Settings and Varied Groups (Q5200589) (← links)
- A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption (Q6053404) (← links)
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity (Q6618628) (← links)
- Making the identity-based Diffie-Hellman key exchange efficiently revocable (Q6619930) (← links)