Author of the publication

Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 40-56 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.. IWSEC, volume 10418 of Lecture Notes in Computer Science, page 192-211. Springer, (2017)Security of Sequential Multiple Encryption., , and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 20-39. Springer, (2010)Forward-Secure Authenticated-Encryption in Multi-Receiver Setting., , , and . SECRYPT, page 141-148. INSTICC Press, (2006)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 164-180. Springer, (2010)Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (6): 1088-1099 (2013)Provably Secure Key-Updating Schemes in Identity-Based Systems., , , and . J. Circuits Syst. Comput., 1 (3): 257-272 (1991)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , and . Des. Codes Cryptogr., 76 (3): 469-504 (2015)Security Enhancement of Identity-Based Identification with Reversibility., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 202-213. Springer, (2012)Strong Security Notions for Timed-Release Public-Key Encryption Revisited., , , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 88-108. Springer, (2011)Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable., , , , , and . LATINCRYPT, volume 14168 of Lecture Notes in Computer Science, page 171-191. Springer, (2023)