The following publications are possibly variants of this publication:
- Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random OraclesKazuki Yoneyama. secrypt 2013: 518-523
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random OraclesRen Ishibashi, Kazuki Yoneyama. acns 2021: 3-27 [doi]
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random OraclesRen Ishibashi, Kazuki Yoneyama. ieiceta, 105-A(9):1252-1269, September 2022. [doi]
- Exposure-Resilient One-Round Tripartite Key Exchange without Random OraclesKoutarou Suzuki, Kazuki Yoneyama. ieicet, 97-A(6):1345-1355, 2014. [doi]
- Exposure-Resilient One-Round Tripartite Key Exchange without Random OraclesKoutarou Suzuki, Kazuki Yoneyama. acns 2013: 458-474 [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. ieicet, 94-A(6):1306-1317, 2011. [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. IWSEC 2010: 164-180 [doi]