Author of the publication

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.

, and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 458-474. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 467-484. Springer, (2012)Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 490-509. Springer, (2011)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 3-27. Springer, (2021)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 164-180. Springer, (2010)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , and . Des. Codes Cryptogr., 76 (3): 469-504 (2015)Secure distributed constraint satisfaction: reaching agreement without revealing private information., , and . Artif. Intell., 161 (1-2): 229-245 (2005)Receipt-Free Sealed-Bid Auction., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 191-199. Springer, (2002)Relinkable Ring Signature., , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 518-536. Springer, (2009)Secure Generalized Vickrey Auction without Third-party Servers., and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 132-146. Springer, (2004)Secure Multi-Party Computation for Elliptic Curves., and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 98-108. Springer, (2014)