Author of the publication

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.

, , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 164-180. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles., and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 458-474. Springer, (2013)Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange.. Pairing, volume 6487 of Lecture Notes in Computer Science, page 147-166. Springer, (2010)Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency., and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 489-501. Springer, (2017)How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!, , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 382-398. Springer, (2009)One-Round Authenticated Group Key Exchange from Isogenies., , and . IACR Cryptol. ePrint Arch., (2018)Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1122-1131 (2010)Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 40-56 (2012)Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism., , , and . AsiaCCS, page 83-94. ACM, (2013)Modeling Agreement Problems in the Universal Composability Framework., , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 350-361. Springer, (2007)Compact public key encryption without full random oracles., and . Pervasive Mob. Comput., (2017)