메뉴 건너뛰기




Volumn 154, Issue 2, 2006, Pages 270-276

Provably secure non-interactive key distribution based on pairings

Author keywords

Identity based cryptography; Key distribution; Non interactive; Pairings; Random oracle model; Security proof

Indexed keywords

COMPUTATIONAL METHODS; POLYNOMIALS; PROBLEM SOLVING; RANDOM PROCESSES;

EID: 29244438183     PISSN: 0166218X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dam.2005.03.024     Document Type: Conference Paper
Times cited : (44)

References (25)
  • 1
    • 35248835023 scopus 로고    scopus 로고
    • Constructing elliptic curves with prescribed embedding degrees
    • S. Cimato, C. Galdi, G. Persiano (Eds.), Security in Communication Networks - Third International Conference, SCN 2002, Amalfi, Italy, September 2002 Springer, Berlin
    • P. Barreto, B. Lynn, M. Scott, Constructing elliptic curves with prescribed embedding degrees, in: S. Cimato, C. Galdi, G. Persiano (Eds.), Security in Communication Networks - Third International Conference, SCN 2002, Amalfi, Italy, September 2002, Lecture Notes in Computer Science, vol. 2576, Springer, Berlin, 2003, pp. 257-267.
    • (2003) Lecture Notes in Computer Science , vol.2576 , pp. 257-267
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput. 32 (3) (2003) 586-615
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 3
    • 29244446683 scopus 로고    scopus 로고
    • Advances in cryptology - Crypto 2001
    • extended abstract Springer, Berlin
    • extended abstract in: J. Kilian (Ed.), Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science, vol. 2139, Springer, Berlin, pp. 514-532.
    • Lecture Notes in Computer Science , vol.2139 , pp. 514-532
    • Kilian, J.1
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • C. Boyd (Ed.), Advances in Cryptology - ASIACRYPT 2001 Springer, Berlin
    • D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: C. Boyd (Ed.), Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 514-532.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
    • D. Boneh (Ed.), Advances in Cryptology - CRYPTO 2003 Springer, Berlin
    • X. Boyen, Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography, in: D. Boneh (Ed.), Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, Springer, Berlin, 2003, pp. 383-399.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 6
    • 29244432071 scopus 로고    scopus 로고
    • Elliptic curves suitable for pairing based cryptography
    • to appear in
    • F. Brezing, A. Weng, Elliptic curves suitable for pairing based cryptography, to appear in Designs, Codes and Cryptography (2003).
    • (2003) Designs, Codes and Cryptography
    • Brezing, F.1    Weng, A.2
  • 7
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Y. Desmedt (Ed.)
    • J. Cha, J. Cheon, An identity-based signature from gap Diffie-Hellman groups, in: Y. Desmedt (Ed.), Public Key Cryptography - PKC 2003, 2002, pp. 18-30.
    • (2002) Public Key Cryptography - PKC 2003 , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 8
    • 17444391606 scopus 로고    scopus 로고
    • Building curves with arbitrary small MOV degree over finite prime fields
    • R. Dupont, A. Enge, and F. Morain Building curves with arbitrary small MOV degree over finite prime fields J. Cryptology 18 2 2005 79 89
    • (2005) J. Cryptology , vol.18 , Issue.2 , pp. 79-89
    • Dupont, R.1    Enge, A.2    Morain, F.3
  • 9
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • G. Frey, and H.-G. Rück A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves Math. Comp. 62 206 1994 865 874
    • (1994) Math. Comp. , vol.62 , Issue.206 , pp. 865-874
    • Frey, G.1    Rück, H.-G.2
  • 10
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • K. Nyberg, H. Heys (Eds.), Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. Johns, Canada, August 2002 Springer, Berlin
    • F. Hess, Efficient identity-based signature schemes based on pairings, in: K. Nyberg, H. Heys (Eds.), Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. Johns, Canada, August 2002, Lecture Notes in Computer Science, vol. 2595, Springer, Berlin, 2003, pp. 310-324.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 310-324
    • Hess, F.1
  • 11
    • 84949219772 scopus 로고    scopus 로고
    • Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
    • D.R. Stinson, S. Tavares (Eds.), Selected Areas in Cryptography 2000 Springer, Berlin
    • D. Hühnlein, M.J. Jacobson Jr., D. Weber, Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders, in: D.R. Stinson, S. Tavares (Eds.), Selected Areas in Cryptography 2000, Lecture Notes in Computer Science, vol. 2012, Springer, Berlin, 2000, pp. 275-287.
    • (2000) Lecture Notes in Computer Science , vol.2012 , pp. 275-287
    • Hühnlein, D.1    Jacobson Jr., M.J.2    Weber, D.3
  • 12
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • W. Bosma (Ed.), Algorithmic Number Theory - ANTS-IV Springer, Berlin
    • A. Joux, A one round protocol for tripartite Diffie-Hellman, in: W. Bosma (Ed.), Algorithmic Number Theory - ANTS-IV, Lecture Notes in Computer Science, vol. 1838, Springer, Berlin, 2000, pp. 358-394.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 358-394
    • Joux, A.1
  • 13
    • 29244490811 scopus 로고    scopus 로고
    • Diplomarbeit, Technische Universität Darmstadt, Deutschland
    • D. Kügler, Eine Aufwandsanalyse für identitätsbasierte Kryptosysteme, Diplomarbeit, Technische Universität Darmstadt, Deutschland, available at ftp://ftp.informatik.tu-darmstadt.de/pub/TI/reports/kuegler.IDCS. diplom.ps.gz, 1998.
    • (1998) Eine Aufwandsanalyse für Identitätsbasierte Kryptosysteme
    • Kügler, D.1
  • 14
    • 0242292905 scopus 로고    scopus 로고
    • A note on the weakness of the Maurer-Yacobi squaring method
    • Fachbereich Informatik, Technische Universität Darmstadt
    • D. Kügler, M. Maurer, A note on the weakness of the Maurer-Yacobi squaring method, Technical Report TI-15/99, Fachbereich Informatik, Technische Universität Darmstadt, available at ftp://ftp.informatik.tu-darmstadt.de/ pub/TI/TR/TI-99-15.weaksquaring.ps.gz, 1999.
    • (1999) Technical Report , vol.TI-15-99
    • Kügler, D.1    Maurer, M.2
  • 15
    • 35748952969 scopus 로고
    • Modified Maurer-Yacobi's scheme and its applications
    • J. Seberry, Y. Zheng (Eds.), Advances in Cryptology - AUSCRYPT'92
    • P. J. Lee, C. H. Lim, Modified Maurer-Yacobi's scheme and its applications, in: J. Seberry, Y. Zheng (Eds.), Advances in Cryptology - AUSCRYPT'92, Lecture Notes in Computer Science, vol. 718, 1992, pp. 308-323.
    • (1992) Lecture Notes in Computer Science , vol.718 , pp. 308-323
    • Lee, P.J.1    Lim, C.H.2
  • 16
    • 35048859269 scopus 로고    scopus 로고
    • Efficient signcryption with key privacy from gap Diffie-Hellman groups
    • F. Bao, R. Deng, J. Zhou (Eds.), Public Key Cryptography - PKC 2004 Springer, Berlin
    • B. Libert, J.-J. Quisquater, Efficient signcryption with key privacy from gap Diffie-Hellman groups, in: F. Bao, R. Deng, J. Zhou (Eds.), Public Key Cryptography - PKC 2004, Lecture Notes in Computer Science, vol. 2947, Springer, Berlin, 2004, pp. 187-200.
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 187-200
    • Libert, B.1    Quisquater, J.-J.2
  • 17
    • 3042553102 scopus 로고
    • Non-interactive public-key cryptography
    • D. Davies (Ed.), Advances in Cryptology - EUROCRYPT '91 Springer, Berlin
    • U. Maurer, Y. Yacobi, Non-interactive public-key cryptography, in: D. Davies (Ed.), Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, 1992, pp. 498-507.
    • (1992) Lecture Notes in Computer Science , vol.547 , pp. 498-507
    • Maurer, U.1    Yacobi, Y.2
  • 18
    • 0012132506 scopus 로고    scopus 로고
    • A non-interactive public-key distribution system
    • U. Maurer, and Y. Yacobi A non-interactive public-key distribution system Des. Codes Cryptogr. 9 3 1996 305 316
    • (1996) Des. Codes Cryptogr. , vol.9 , Issue.3 , pp. 305-316
    • Maurer, U.1    Yacobi, Y.2
  • 19
    • 0027662341 scopus 로고
    • Reducing elliptic curves logarithms to logarithms in a finite field
    • A. Menezes, T. Okamoto, and S.A. Vanstone Reducing elliptic curves logarithms to logarithms in a finite field IEEE Trans. Inform. Theory IT-39 5 1993 1639 1646
    • (1993) IEEE Trans. Inform. Theory , vol.IT-39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.A.3
  • 20
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • A. Miyaji, M. Nakabayashi, and S. Takano New explicit conditions of elliptic curve traces for FR-reduction IEICE Trans. Fundamentals E84-A 5 2001 1234 1243
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 21
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. Paterson ID-based signatures from pairings on elliptic curves Electron. Lett. 38 18 2002 1025 1026
    • (2002) Electron. Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. Goos, J. Hartmanis (Eds.), Advances in Cryptology - CRYPTO'84 Springer, Berlin
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: G. Goos, J. Hartmanis (Eds.), Advances in Cryptology - CRYPTO'84, Lecture Notes in Computer Science, vol. 196, Springer, Berlin, 1985, pp. 47-53.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 24
    • 0037142442 scopus 로고    scopus 로고
    • An identity-based authenticated key agreement protocol based on the Weil pairing
    • N. Smart An identity-based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 38 2002 630 632
    • (2002) Electron. Lett. , vol.38 , pp. 630-632
    • Smart, N.1
  • 25
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • B. Pfitzmann (Ed.), Advances in Cryptology - EUROCRYPT 2001 Springer, Berlin
    • E. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, in: B. Pfitzmann (Ed.), Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 2001, pp. 195-210.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 195-210
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.