메뉴 건너뛰기




Volumn 3796 LNCS, Issue , 2005, Pages 428-441

Efficient identity-based key encapsulation to multiple parties

Author keywords

Hybrid Encryption; Identity Based Cryptography; Key Encapsulation Mechanism (KEM); Provable Security

Indexed keywords

COMPUTER OPERATING SYSTEMS; ENCAPSULATION; MATHEMATICAL MODELS; RANDOM PROCESSES; RELATIONAL DATABASE SYSTEMS; SECURITY OF DATA;

EID: 33646823652     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11586821_28     Document Type: Conference Paper
Times cited : (33)

References (17)
  • 1
    • 1842566513 scopus 로고    scopus 로고
    • DHAES: An encryption scheme based on the Diffie-Hellman problem
    • Report 1999/007
    • M. Abdalla, M. Bellare and P. Rogaway. DHAES: An encryption scheme based on the Diffie-Hellman problem. Cryptology ePrint Archive, Report 1999/007. 1999.
    • (1999) Cryptology ePrint Archive
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in the multi-user setting: Security proofs and improvements
    • LNCS 1807: Springer-Verlag
    • M. Bellare, A. Boldyreva and S. Micali. Public-key encryption in the multi-user setting: security proofs and improvements. Advances in Cryptology - EUROCRYPT 2000, LNCS 1807:259-274. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32:586-615. 2003.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 7
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack. SIAM Journal on Computing, 33:167-226. 2003.
    • (2003) SIAM Journal on Computing , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 8
    • 33646842805 scopus 로고    scopus 로고
    • A designer's guide to KEMs
    • LNCS 2898: Springer-Verlag
    • A. W. Dent. A designer's guide to KEMs. Coding and Cryptography, LNCS 2898:133-151. Springer-Verlag, 2003.
    • (2003) Coding and Cryptography , pp. 133-151
    • Dent, A.W.1
  • 11
    • 1142282396 scopus 로고    scopus 로고
    • Authenticated identity-based encryption
    • Report 2002/072
    • B. Lynn. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072. 2002.
    • (2002) Cryptology ePrint Archive
    • Lynn, B.1
  • 13
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • LNCS 1992: Springer-Verlag
    • T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. Public Key Cryptography - PKC 2001, LNCS 1992:104-118. Springer-Verlag, 2001.
    • (2001) Public Key Cryptography - PKC 2001 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 14
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • LNCS 576: Springer-Verlag
    • C. Rackoff and D. R. Simon Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology - CRYPTO 1991, LNCS 576:433-444. Springer-Verlag, 1991
    • (1991) Advances in Cryptology - CRYPTO 1991 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 15
    • 35248891001 scopus 로고    scopus 로고
    • Access control using pairing based cryptography
    • LNCS 2612: Springer-Verlag
    • N. P. Smart. Access control using pairing based cryptography. Topics in Cryptology - CT-RSA 2003, LNCS 2612:111-121. Springer-Verlag, 2003.
    • (2003) Topics in Cryptology - CT-RSA 2003 , pp. 111-121
    • Smart, N.P.1
  • 16
    • 23944449681 scopus 로고    scopus 로고
    • Efficient key encapsulation to multiple parties
    • LNCS 3352: Springer-Verlag
    • N. P. Smart. Efficient key encapsulation to multiple parties. Security in Communication Networks, LNCS 3352:208-219. Springer-Verlag, 2005.
    • (2005) Security in Communication Networks , pp. 208-219
    • Smart, N.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.