Revocable hierarchical identity-based authenticated key exchange
DOI10.1007/978-3-031-08896-4_1OpenAlexW4286758963MaRDI QIDQ2104408FDOQ2104408
Authors: Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_1
revocable hierarchical identity-based authenticated key exchangerevocable hierarchical identity-based key encapsulation mechanismrhid-eCK model
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- On ideal lattices and learning with errors over rings
- Efficient public key encryption based on ideal lattices (extended abstract)
- Title not available (Why is that?)
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Title not available (Why is that?)
- Endomorphisms for faster elliptic curve cryptography on a large class of curves
- Title not available (Why is that?)
- Better key sizes (and attacks) for LWE-based encryption
- Keying hash functions for message authentication
- Lossy trapdoor functions and their applications
- Stronger Security of Authenticated Key Exchange
- Topics in Cryptology – CT-RSA 2005
- Title not available (Why is that?)
- Computational extractors and pseudorandomness
- Cryptographic extraction and key derivation: the HKDF scheme
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Revocable hierarchical identity-based encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- 2-pass key exchange protocols from CPA-secure KEM
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Simplified revocable hierarchical identity-based encryption from lattices
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
- Strongly secure identity-based key exchange with single pairing operation
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
Uses Software
This page was built for publication: Revocable hierarchical identity-based authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2104408)