Keyword : authenticated key exchange


Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 132-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
authenticated key exchangekey encapsulation mechanismbounded CCA
 Summary | Full Text:PDF

Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1335-1344
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangehierarchical ID-based authenticated key exchangeexposure-resilience
 Summary | Full Text:PDF

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1345-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangetripartite key exchangestandard modeldual-receiver encryption
 Summary | Full Text:PDF

Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1112-1123
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangeattribute-based authenticated key exchangeCK model
 Summary | Full Text:PDF

One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1124-1138
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangestrong forward secrecysigncryption
 Summary | Full Text:PDF

Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
Minkyu KIM Atsushi FUJIOKA Berkant USTAOLU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 29-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
authenticated key exchangeeCK modelNAXOS' approachtrapdoor test
 Summary | Full Text:PDF

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
Jooyoung LEE Je Hong PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 129-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangecomputational Diffie-Hellman assumptiongap Diffie-Hellman assumptionextended Canetti-Krawczyk model
 Summary | Full Text:PDF

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6 ; pp. 1086-1101
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attacksRSAleakage of stored secretsreplacement attacks
 Summary | Full Text:PDF

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 102-115
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attackspassword-authenticated key exchangeanonymityefficiencyprovable security
 Summary | Full Text:PDF

Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 113-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordleakage of static keyleakage of ephemeral key3-party setting
 Summary | Full Text:PDF

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2 ; pp. 474-490
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticated key exchangepasswordson-line and off-line dictionary attacksRSAleakage of stored secretsefficiencyperfect forward secrecy
 Summary | Full Text:PDF

Universally Composable Hierarchical Hybrid Authenticated Key Exchange
Haruki OTA Kazuki YONEYAMA Shinsaku KIYOMOTO Toshiaki TANAKA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
passwordDiffie-Hellmanauthenticated key exchangeuniversal composabilityhierarchical hybrid constructionMAC (Message Authentication Code)
 Summary | Full Text:PDF