Berkant USTAO<sg00044.gif>LU


id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi FUJIOKA Fumitaka HOSHINO Tetsutaro KOBAYASHI Koutarou SUZUKI Berkant USTAOLU Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1139-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
identity-based authenticated key exchangegap Bilinear Diffie-Hellman assumptionidentity-based extended Canetti-Krawczyk modelrandom oracle model
 Summary | Full Text:PDF(695.8KB)

Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
Minkyu KIM Atsushi FUJIOKA Berkant USTAOLU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 29-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
authenticated key exchangeeCK modelNAXOS' approachtrapdoor test
 Summary | Full Text:PDF(358.4KB)