Revocable hierarchical identity-based authenticated key exchange (Q2104408): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Keying Hash Functions for Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Extractors and Pseudorandomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient identity-based encryption with hierarchical key-insulation from HIBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly secure authenticated key exchange from factoring, codes, and lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263421 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Endomorphisms for faster elliptic curve cryptography on a large class of curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783726 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructions of CCA-Secure Revocable Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: 2-Pass Key Exchange Protocols from CPA-Secure KEM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revocable hierarchical identity-based encryption with shorter private keys and update keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Key Sizes (and Attacks) for LWE-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revocable hierarchical identity-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public Key Encryption Based on Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly secure identity-based key exchange with single pairing operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified Revocable Hierarchical Identity-Based Encryption from Lattices / rank
 
Normal rank

Latest revision as of 00:19, 31 July 2024

scientific article
Language Label Description Also known as
English
Revocable hierarchical identity-based authenticated key exchange
scientific article

    Statements

    Revocable hierarchical identity-based authenticated key exchange (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    7 December 2022
    0 references
    revocable hierarchical identity-based authenticated key exchange
    0 references
    rhid-eCK model
    0 references
    revocable hierarchical identity-based key encapsulation mechanism
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references