Keyword : computational Diffie-Hellman assumption


Secure Hierarchical Identity-Based Identification without Random Oracles
Atsushi FUJIOKA Taiichi SAITO Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1307-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical identity-based identificationimpersonation under active and concurrent attackscomputational Diffie-Hellman assumptionRSA assumption
 Summary | Full Text:PDF(652.3KB)

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
Jooyoung LEE Je Hong PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 129-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangecomputational Diffie-Hellman assumptiongap Diffie-Hellman assumptionextended Canetti-Krawczyk model
 Summary | Full Text:PDF(3.4MB)

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF(397.8KB)