Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
From MaRDI portal
Publication:2117023
Recommendations
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Strongly secure identity-based key exchange with single pairing operation
Cites work
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- (Hierarchical) identity-based encryption from affine message authentication
- Advances in Cryptology - EUROCRYPT 2004
- Asymptotically efficient lattice-based digital signatures
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient lattice (H)IBE in the standard model
- Hierarchical ID-Based Cryptography
- Lattice cryptography for the internet
- One-time signatures and chameleon hash functions
- Stronger Security of Authenticated Key Exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Tightly secure hierarchical identity-based encryption
Cited in
(2)
This page was built for publication: Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117023)