메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 515-532

Efficient and provably-secure identity-based signatures and signcryption from bilinear maps

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; MATHEMATICAL MODELS; RANDOM PROCESSES; SECURITY OF DATA;

EID: 33646820668     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_28     Document Type: Conference Paper
Times cited : (492)

References (39)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Eurocrypt'02. Springer
    • J.-H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Eurocrypt'02, volume 2332 of LNCS, pages 83-107. Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.-H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • SAC'03. Springer
    • P. S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In SAC'03, volume 3006 of LNCS, pages 17-25. Springer, 2003.
    • (2003) LNCS , vol.3006 , pp. 17-25
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 4
    • 27244440989 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • P. S. L. M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. Cryptology ePrint Archive, Report 2005/133, 2005. http://eprint.iacr.org/2005/133.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.133
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 5
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • Eurocrypt'04. Springer
    • M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In Eurocrypt'04, volume 3027 of LNCS, pages 268-286. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 6
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, USA. ACM Press
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, pages 62-73, Fairfax, USA, 1993. ACM Press.
    • (1993) 1st ACM Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Eurocrypt'04. Springer
    • D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 8
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Crypto'04. Springer
    • D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In Crypto'04, volume 3152 of LNCS, pages 443-459. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 9
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Eurocrypt'04. Springer
    • D. Boneh and X. Boyen. Short signatures without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 56-73. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Crypto'01. Springer
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
    • Crypto'03. Springer
    • X. Boyen. Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography. In Crypto'03, volume 2729 of LNCS, pages 383-399. Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 12
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • PKC'03. Springer
    • J. C. Cha and J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In PKC'03, volume 2567 of LNCS, pages 18-30. Springer, 2003.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 13
    • 33750714478 scopus 로고    scopus 로고
    • Security proof of Sakai-Kasahara's identity-based encryption scheme
    • L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. Cryptology ePrint Archive, Report 2005/226, 2005. http://eprint.iacr.org/2005/226.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.226
    • Chen, L.1    Cheng, Z.2
  • 14
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • PKC'05. Springer
    • L. Chen and J. Malone-Lee. Improved identity-based signcryption. In PKC'05, volume 3386 of LNCS, pages 362-379. Springer, 2005.
    • (2005) LNCS , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 15
    • 34250336096 scopus 로고    scopus 로고
    • A new id-based signature with batch verification
    • J. H. Cheon, Y. Kim, and H. J. Yoon. A new id-based signature with batch verification. Cryptology ePrint Archive, Report 2004/131, 2004. http://eprint.iacr.org/2004/131.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.131
    • Cheon, J.H.1    Kim, Y.2    Yoon, H.J.3
  • 16
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • 6th International Conference on Information Security and Cryptology - ICISC'03. Springer
    • S. S. M. Chow, S. M. Yiu, L. C. K. Hui, and K. P. Chow. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In 6th International Conference on Information Security and Cryptology - ICISC'03, volume 2971 of LNCS, pages 352-369. Springer, 2003.
    • (2003) LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 18
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • 8th IMA International Conference. Springer
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In 8th IMA International Conference, volume 2260 of LNCS, pages 360-363. Springer, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 19
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • PKC'03. Springer
    • Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC'03, volume 2567 of LNCS, pages 130-144. Springer, 2003.
    • (2003) LNCS , vol.2567 , pp. 130-144
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 20
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Crypto'86. Springer
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Crypto'86, volume 0263 of LNCS, pages 186-194. Springer, 1986.
    • (1986) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 21
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Asiacrypt'02. Springer
    • C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Asiacrypt'02, volume 2501 of LNCS, pages 548-566. Springer, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 22
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen message attacks
    • S. Goldwasser, S. Micali, and R. Rivers t. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal of Computing, 17(2):281-308, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivers, R.T.3
  • 23
    • 84947558992 scopus 로고
    • A "paradoxical" identity-based signature scheme resulting from zero-knowledge
    • Crypto'88. Springer
    • L. Guillou and J.-J. Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In Crypto'88, volume 0403 of LNCS, pages 216-231. Springer, 1988.
    • (1988) LNCS , vol.403 , pp. 216-231
    • Guillou, L.1    Quisquater, J.-J.2
  • 24
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • SAC'02. Springer
    • F. Heß. Efficient identity based signature schemes based on pairings. In SAC'02, volume 2595 of LNCS, pages 310-324. Springer, 2003.
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Heß, F.1
  • 25
    • 33646757123 scopus 로고    scopus 로고
    • Identity-based identification without random oracles
    • LNCS. Springer. To appear
    • K. Kurosawa and S.-H. Heng. Identity-based identification without random oracles. In ISH'05, LNCS. Springer, 2005. To appear.
    • (2005) ISH'05
    • Kurosawa, K.1    Heng, S.-H.2
  • 26
    • 84939205648 scopus 로고    scopus 로고
    • New identity based signcryption schemes from pairings
    • Paris, France
    • B. Libert and J.-J. Quisquater. New identity based signcryption schemes from pairings. In IEEE Information Theory Workshop, Paris, France, 2003. http://eprint.iacr.org/2003/023.
    • (2003) IEEE Information Theory Workshop
    • Libert, B.1    Quisquater, J.-J.2
  • 27
    • 0242445175 scopus 로고    scopus 로고
    • Identity-based signcryption
    • J. Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/2002/098.
    • (2002) Cryptology ePrint Archive, Report , vol.2002 , Issue.98
    • Malone-Lee, J.1
  • 28
    • 33646848363 scopus 로고    scopus 로고
    • Efficient and forward-secure identity-based signcryption
    • N. McCullagh and P. S. L. M. Barreto. Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report 2004/117, 2004. http://eprint.iacr.org/2004/117.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.117
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 29
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5):1234-1243, 2001.
    • (2001) IEICE Transactions on Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 30
    • 33645596850 scopus 로고    scopus 로고
    • Signcryption scheme for identity-based cryptosystems
    • D. Nalla and K. C. Reddy. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2003. http://eprint.iacr.org/2003/066.
    • (2003) Cryptology ePrint Archive, Report , vol.2003 , Issue.66
    • Nalla, D.1    Reddy, K.C.2
  • 31
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Eurocrypt'96. Springer
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Eurocrypt'96, volume 1992 of LNCS, pages 387-398. Springer, 1996.
    • (1996) LNCS , vol.1992 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 32
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 33
    • 33645608384 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve
    • Hamamatsu, Japan
    • R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. In SCIS'03, Hamamatsu, Japan, 2003. http://eprint.iacr.org/2003/054.
    • (2003) SCIS'03
    • Sakai, R.1    Kasahara, M.2
  • 34
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Crypto'84. Springer
    • A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 0196 of LNCS, pages 47-53. Springer, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 35
    • 33646817646 scopus 로고    scopus 로고
    • On computable isomorphisms in efficient pairing based systems
    • N. P. Smart and F. Vercauteren. On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116, 2005. http://eprint.iacr.org/2005/116.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.116
    • Smart, N.P.1    Vercauteren, F.2
  • 36
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Eurocrypt'05. Springer
    • B. Waters. Efficient identity-based encryption without random oracles. In Eurocrypt'05, volume 3494 of LNCS, pages 114-127. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 37
    • 24144434019 scopus 로고    scopus 로고
    • Fast and proven secure blind identity-based signcryption from pairings
    • CT-RSA '05. Springer
    • T. H. Yuen and V. K. Wei. Fast and proven secure blind identity-based signcryption from pairings. In CT-RSA '05, volume 3376 of LNCS, pages 305-322. Springer, 2003.
    • (2003) LNCS , vol.3376 , pp. 305-322
    • Yuen, T.H.1    Wei, V.K.2
  • 38
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • PKC'04. Springer
    • F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC'04, volume 2947 of LNCS, pages 277-290. Springer, 2004.
    • (2004) LNCS , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 39
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) cost(signature) + cost(encryption)
    • Crypto'97. Springer
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) cost(signature) + cost(encryption). In Crypto'97, volume 1294 of LNCS, pages 165-179. Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.