Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
From MaRDI portal
Publication:2117023
DOI10.1007/978-3-030-78372-3_1zbMath1489.68047OpenAlexW3167083818MaRDI QIDQ2117023
Kazuki Yoneyama, Ren Ishibashi
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78372-3_1
authenticated key exchangeadaptive ID securityHID-eCK modelhierarchical ID-based authenticated key exchange
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Asymptotically efficient lattice-based digital signatures
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Lattice Cryptography for the Internet
- One-Time Signatures and Chameleon Hash Functions
- Stronger Security of Authenticated Key Exchange
- Efficient Lattice (H)IBE in the Standard Model
- Hierarchical ID-Based Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles