메뉴 건너뛰기




Volumn 3619, Issue , 2005, Pages 845-852

Identity based conference key distribution scheme from parings

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 26444595628     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11534310_89     Document Type: Conference Paper
Times cited : (4)

References (30)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-Crypto 2001, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing, In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 33846938928 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J.C. Cha and J.H. Cheon. An identity-based signature from gap Diffie-Hellman groups, Cryptology ePrint Archive, Report 2002/018, available at http:// eprint.iacr.org/2002/018/.
    • Cryptology EPrint Archive, Report , vol.2002 , Issue.18
    • Cha, J.C.1    Cheon, J.H.2
  • 6
    • 0026867210 scopus 로고
    • Improved identity- Based key sharing system for multiaddress communcation
    • T. Chikazawa and A. Yamagishi. Improved identity- based key sharing system for multiaddress communcation, Electr. Lett., vol. 28, no.11, pp.1015-1017, 1992.
    • (1992) Electr. Lett. , vol.28 , Issue.11 , pp. 1015-1017
    • Chikazawa, T.1    Yamagishi, A.2
  • 7
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and Coding
    • C. Cocks. An identity based encryption scheme based on quadratic residues, In Cryptography and Coding, LNCS 2260, pp.360-363, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 8
    • 0027615034 scopus 로고
    • ID-based cryptographic schemes for user identification, digital signature, and key distribution
    • L. Harn and S. Yang. ID-based cryptographic schemes for user identification, digital signature, and key distribution, IEEE J. on sele. areas in comm., vol.11, No.5 pp.757-760, 1993.
    • (1993) IEEE J. on Sele. Areas in Comm. , vol.11 , Issue.5 , pp. 757-760
    • Harn, L.1    Yang, S.2
  • 9
    • 1642407903 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Proceedings of 9th workshop on selected areas in cryptography-SAC2002
    • F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryptography-SAC2002. Lecture Notes in Computer Science.
    • Lecture Notes in Computer Science
    • Hess, F.1
  • 10
    • 0037974305 scopus 로고    scopus 로고
    • Exponent group signature schemes and efficient identity based signature schemes based on pairings
    • F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings, Cryptology ePrint Archive, Report 2002/012, available at http://eprint.iacr.org/2002/012/.
    • Cryptology EPrint Archive, Report , vol.2002 , Issue.12
    • Hess, F.1
  • 11
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Proc. Eurocrypt 2002, Springer-Verlag
    • J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption, Proc. Eurocrypt 2002, LNCS 2332, pp.466-481, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 12
    • 0028017207 scopus 로고
    • Identity-based conference key broadcast systems
    • T. Hwang and J. L. Chen. Identity-based conference key broadcast systems, IEE Proc. Comput. Digit. Tech., vol.141, No.1 pp.57-60, 1994.
    • (1994) IEE Proc. Comput. Digit. Tech. , vol.141 , Issue.1 , pp. 57-60
    • Hwang, T.1    Chen, J.L.2
  • 14
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Proc. Fourth Algorithmic Number Theory Symposium, Springer-Verlag
    • A. Joux. A one round protocol for tripartite Diffie-Hellman, Proc. Fourth Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1838, Springer-Verlag, pp. 385-394, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-394
    • Joux, A.1
  • 17
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Advances in Cryptology-CRYPTO '89
    • R. Merkle. One way hash functions and DES, Advances in Cryptology-CRYPTO '89, Lecture Notes in Computer Science Vol. 435, pp.428-446, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.1
  • 19
    • 0024665726 scopus 로고
    • Key distribution system based on identification information
    • E. Okamoto and K. Tanaka. Key distribution system based on identification information, IEEE Journal on Selected areas in comm., vol.7, No.4, 481-485, 1989.
    • (1989) IEEE Journal on Selected Areas in Comm. , vol.7 , Issue.4 , pp. 481-485
    • Okamoto, E.1    Tanaka, K.2
  • 20
    • 1642516007 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K.G. Paterson. ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/004, available at http://eprint.iacr.org/ 2002/004/.
    • Cryptology EPrint Archive, Report , vol.2002 , Issue.4
    • Paterson, K.G.1
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to Share a Secret, Communications of the ACM, vol. 22, no. 11, 612-613, 1979
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 22
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology-Crypto 84, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pp.47-53, Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 23
    • 1842461904 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • V. Shoup. A composition theorem for universal one-way hash functions,In Advances in Cryptology-Eurocrypt'2000, 2000.
    • (2000) Advances in Cryptology-Eurocrypt'2000
    • Shoup, V.1
  • 24
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing, Electron. Lett., Vol.38, No.13, pp.630-632, 2002.
    • (2002) Electron. Lett. , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 25
    • 85032215902 scopus 로고
    • A realization scheme for the identity-based cryptosystem
    • proc. Crypto 87, Springer-Verlag
    • H. Tanaka. A realization scheme for the identity-based cryptosystem, proc. Crypto 87, LNCS 293 pp.341-349, Springer-Verlag, 1987.
    • (1987) LNCS , vol.293 , pp. 341-349
    • Tanaka, H.1
  • 26
    • 0024664858 scopus 로고
    • An ID-based cryptosystem based on the discrete logarithm problem
    • S. Tsuji and T.Itoh. An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol.7, No.4, pp.467-473, 1989.
    • (1989) IEEE Journal of Selected Areas in Communications , vol.7 , Issue.4 , pp. 467-473
    • Tsuji, S.1    Itoh, T.2
  • 27
    • 0036538428 scopus 로고    scopus 로고
    • A secure fault-tolerant conference-key agreement protocol
    • W.G. Tzeng. A Secure Fault-Tolerant Conference-Key Agreement Protocol, IEEE Trans. on Computers, Vol.51 No.4, pp.373-379, 2002.
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.4 , pp. 373-379
    • Tzeng, W.G.1
  • 28
    • 0031098126 scopus 로고    scopus 로고
    • Conference key distribution system with user anonymity based on algebraic approach
    • TC. Wu. Conference key distribution system with user anonymity based on algebraic approach, IEE Proceedings Computers and Digital Techniques, Vol. 14, No. 2, pp. 145-148, 1997.
    • (1997) IEE Proceedings Computers and Digital Techniques , vol.14 , Issue.2 , pp. 145-148
    • Wu, T.C.1
  • 30
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings
    • ACISP 2003
    • F.Zhang and K.Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. ACISP 2003, LNCS 2727, pages 312-323, 2003.
    • (2003) LNCS , vol.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.