The following publications are possibly variants of this publication:
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random OraclesRen Ishibashi, Kazuki Yoneyama. ieiceta, 105-A(9):1252-1269, September 2022. [doi]
- Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random OraclesKazuki Yoneyama. secrypt 2013: 518-523
- Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random OraclesKazuki Yoneyama. ieicet, 97-A(6):1335-1344, 2014. [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. ieicet, 94-A(6):1306-1317, 2011. [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. IWSEC 2010: 164-180 [doi]