Revocable hierarchical identity-based authenticated key exchange
From MaRDI portal
(Redirected from Publication:2104408)
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- scientific article; zbMATH DE number 1842492 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- 2-pass key exchange protocols from CPA-secure KEM
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Better key sizes (and attacks) for LWE-based encryption
- Computational extractors and pseudorandomness
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- Cryptographic extraction and key derivation: the HKDF scheme
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Efficient public key encryption based on ideal lattices (extended abstract)
- Endomorphisms for faster elliptic curve cryptography on a large class of curves
- Keying hash functions for message authentication
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Lossy trapdoor functions and their applications
- On ideal lattices and learning with errors over rings
- Revocable hierarchical identity-based encryption
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Simplified revocable hierarchical identity-based encryption from lattices
- Stronger Security of Authenticated Key Exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Strongly secure identity-based key exchange with single pairing operation
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Revocable hierarchical identity-based authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2104408)