메뉴 건너뛰기




Volumn E80-A, Issue 1, 1997, Pages 54-62

Proxy cryptosystems: Delegation of the power to decrypt ciphertexts

Author keywords

Ciphertext transformation; Proxy; Proxy cryptosystem; Proxy decryptor

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA ACQUISITION; DECODING; SECURITY OF DATA;

EID: 0030687206     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (237)

References (21)
  • 1
    • 85034827254 scopus 로고
    • On privacy homomorphism
    • Advances in Cryptology - Eurocrypt'87, Spring-Verlag
    • E.F. Brickell and Y. Yacobi, "On privacy homomorphism," Lecture Notes in Computer Science 304, Advances in Cryptology - Eurocrypt'87, pp.117-125, Spring-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.304 , pp. 117-125
    • Brickell, E.F.1    Yacobi, Y.2
  • 2
    • 85029541173 scopus 로고
    • Towards practical public key systems secure against chosen ciphertext attacks
    • Advances in Cryptology - Crypto'91, Spring-Verlag
    • I. Damgård, "Towards practical public key systems secure against chosen ciphertext attacks," Lecture Notes in Computer Science 576, Advances in Cryptology - Crypto'91, pp.445-456, Spring-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 445-456
    • Damgård, I.1
  • 3
    • 77649118700 scopus 로고
    • Diffie-Hellman is as strong as discrete log for certain primes
    • Advances in Cryptology - Crypto'88, Spring-Verlag
    • B. den Boer, "Diffie-Hellman is as strong as discrete log for certain primes," Lecture Notes in Computer Science 403, Advances in Cryptology - Crypto'88, pp.530-539, Spring-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.403 , pp. 530-539
    • Den Boer, B.1
  • 4
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-645, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-645
    • Diffie, W.1    Hellman, M.2
  • 5
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithm
    • July
    • T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithm," IEEE Trans. Inf. Theory, vol.IT-31, no.4, pp.469-472, July 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 6
    • 0028481080 scopus 로고
    • A secure broadcast communication method with short messages
    • Aug.
    • M. Mambo, A. Nishikawa, E. Okamoto, and S. Tsujii, "A secure broadcast communication method with short messages," IEICE Trans. Fundamentals, vol.E77-A, no.8, pp.1319-1327, Aug. 1994.
    • (1994) IEICE Trans. Fundamentals , vol.E77-A , Issue.8 , pp. 1319-1327
    • Mambo, M.1    Nishikawa, A.2    Okamoto, E.3    Tsujii, S.4
  • 7
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • Sept.
    • M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: Delegation of the power to sign messages," IEICE Trans. Fundamentals, vol.E79-A, no.9, Sept. 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 9
    • 85031767993 scopus 로고
    • Speeding up secret computation with insecure auxiliary devices
    • Advances in Cryptology - Crypto'88, Spring-Verlag
    • T. Matsumoto, K. Kato, and H. Imai, "Speeding up secret computation with insecure auxiliary devices," Lecture Notes in Computer Science 403, Advances in Cryptology - Crypto'88, pp.497-506, Spring-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 10
    • 33746216662 scopus 로고
    • Directly transformed link encryption
    • Nov.
    • T. Matsumoto, T. Okada, and H. Imai, "Directly transformed link encryption," IECE Trans., vol.J65-D, no.11, pp. 1443-1450, Nov. 1982.
    • (1982) IECE Trans. , vol.J65-D , Issue.11 , pp. 1443-1450
    • Matsumoto, T.1    Okada, T.2    Imai, H.3
  • 11
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Advances in Cryptology - Crypto'94, Spring-Verlag
    • U.M. Maurer, "Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms," Lecture Notes in Computer Science 839, Advances in Cryptology - Crypto'94, pp.271-281, Spring-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 271-281
    • Maurer, U.M.1
  • 12
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Advances in Cryptology - Crypto'92, Spring-Verlag
    • T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes," Lecture Notes in Computer Science 740, Advances in Cryptology - Crypto'92, pp.31-53, Spring-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 13
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • April
    • R. Rivest, "The MD5 message-digest algorithm," Request for Comments 1321, April 1992.
    • (1992) Request for Comments , vol.1321
    • Rivest, R.1
  • 14
    • 0005301490 scopus 로고
    • On databanks and privacy homomorphisms
    • eds. R.A. Demillo et al., Academic Press
    • R. Rivest, L. Adleman, and M. Dertouzos, "On databanks and privacy homomorphisms," in Foundations of Secure Computation, eds. R.A. Demillo et al., pp.168-177, Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 168-177
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun, of the ACM, vol.21, pp.120-126, 1978.
    • (1978) Commun, of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 17
    • 33746255631 scopus 로고
    • A factorization attack against some server-aided computation protocols for the RSA secret computation
    • Jan.
    • A. Shimbo and S. Kawamura, "A factorization attack against some server-aided computation protocols for the RSA secret computation," Proc. 1990 Symposium on Cryptography and Information Security, SCIS90-3B, Jan. 1990.
    • (1990) Proc. 1990 Symposium on Cryptography and Information Security , vol.SCIS90-3B
    • Shimbo, A.1    Kawamura, S.2
  • 18
    • 33746255697 scopus 로고
    • Performance analysis of server-aided secret computation protocols
    • July
    • A. Shimbo and S. Kawamura, "Performance analysis of server-aided secret computation protocols," IEICE Trans., V01.E73, no.7, pp.1073-1080, July 1990.
    • (1990) IEICE Trans. , vol.E73 , Issue.7 , pp. 1073-1080
    • Shimbo, A.1    Kawamura, S.2
  • 19
    • 0023568495 scopus 로고
    • Random self-reducibility and zero-knowledge interactive proofs of possession of information
    • M. Tompa and H. Well, "Random self-reducibility and zero-knowledge interactive proofs of possession of information," Proc. of Symp. on Foundation of Computer Science, pp.472-482, 1987.
    • (1987) Proc. of Symp. on Foundation of Computer Science , pp. 472-482
    • Tompa, M.1    Well, H.2
  • 20
    • 0027612710 scopus 로고
    • New digital signature scheme based on discrete logarithm
    • S.M. Yen and C.S. Laih, "New digital signature scheme based on discrete logarithm," Electron. Letters, vol.29, no.12, pp.1120-1121, 1993.
    • (1993) Electron. Letters , vol.29 , Issue.12 , pp. 1120-1121
    • Yen, S.M.1    Laih, C.S.2
  • 21
    • 85028933312 scopus 로고
    • Practical approaches to attaining security against adaptively chosen ciphertext attacks
    • Advances in Cryptology - Crypto'92, Spring-Verlag
    • Y. Zheng and J. Seberry, "Practical approaches to attaining security against adaptively chosen ciphertext attacks," Lecture Notes in Computer Science 740, Advances in Cryptology - Crypto'92, pp.292-304, Spring-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 292-304
    • Zheng, Y.1    Seberry, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.