Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
From MaRDI portal
Publication:2117023
DOI10.1007/978-3-030-78372-3_1zbMATH Open1489.68047OpenAlexW3167083818MaRDI QIDQ2117023FDOQ2117023
Kazuki Yoneyama, Ren Ishibashi
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78372-3_1
Recommendations
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Strongly secure identity-based key exchange with single pairing operation
authenticated key exchangeadaptive ID securityHID-eCK modelhierarchical ID-based authenticated key exchange
Cites Work
- Efficient Lattice (H)IBE in the Standard Model
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- One-Time Signatures and Chameleon Hash Functions
- Stronger Security of Authenticated Key Exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Tightly secure hierarchical identity-based encryption
- Lattice Cryptography for the Internet
- Asymptotically efficient lattice-based digital signatures
Cited In (2)
Uses Software
This page was built for publication: Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117023)