Revocable hierarchical identity-based authenticated key exchange
From MaRDI portal
Publication:2104408
DOI10.1007/978-3-031-08896-4_1OpenAlexW4286758963MaRDI QIDQ2104408
Junichi Tomida, Atsushi Fujioka, Kazuki Yoneyama, Akira Nagai, Koutarou Suzuki, Yuki Okano
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_1
revocable hierarchical identity-based authenticated key exchangerevocable hierarchical identity-based key encapsulation mechanismrhid-eCK model
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Endomorphisms for faster elliptic curve cryptography on a large class of curves
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Revocable hierarchical identity-based encryption
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
- Strongly secure identity-based key exchange with single pairing operation
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
- Computational Extractors and Pseudorandomness
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
- Keying Hash Functions for Message Authentication
- Stronger Security of Authenticated Key Exchange
- Lossy trapdoor functions and their applications
- On Ideal Lattices and Learning with Errors over Rings
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Efficient Public Key Encryption Based on Ideal Lattices
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- 2-Pass Key Exchange Protocols from CPA-Secure KEM
- Topics in Cryptology – CT-RSA 2005
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
This page was built for publication: Revocable hierarchical identity-based authenticated key exchange