메뉴 건너뛰기




Volumn 3887 LNCS, Issue , 2006, Pages 130-141

Relations among notions of security for identity based encryption schemes

Author keywords

[No Author keywords available]

Indexed keywords

IDENTITY BASED ENCRYPTION SCHEMES (IBE); MULTIPLE RECEIVERS; STANDARD SECURITY NOTION;

EID: 33745632083     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11682462_16     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 2
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • PKC 2005
    • J. Baek, R. Safavi-Naini, and W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In PKC 2005, volume 3386 of LNCS, pages 380-397, 2005.
    • (2005) LNCS , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • CRYPTO '98
    • M. Bellare, A. Desal, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In CRYPTO '98, volume 1462 of LNCS, pages 26-45, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desal, A.2    Pointcheval, D.3    Rogaway, P.4
  • 4
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • CRYPTO '04
    • D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In CRYPTO '04, volume 3152 of LNCS, pages 443-459, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • EUROCRYPT '05
    • D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT '05, volume 3494 of LNCS, pages 440-456, 2005.
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO '01
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO '01, volume 2139 of LNCS, pages 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 85028450627 scopus 로고
    • Non-malleable cryptography (extended abstract)
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography (extended abstract). In STOC '91, pages 542-552, 1991.
    • (1991) STOC '91 , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 8
    • 33745558696 scopus 로고    scopus 로고
    • Security notions for identity based encryption
    • D. Galindo and I. Hasuo, Security notions for identity based encryption, Cryptology ePrint Archive, Report 2005/253, 2005. http://eprint.iacr.org/2005/ 253.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.253
    • Galindo, D.1    Hasuo, I.2
  • 10
    • 29644441305 scopus 로고    scopus 로고
    • On chosen ciphertext security of multiple encryptions
    • O. Goldreich, Y. Lustig, and M. Naor. On chosen ciphertext security of multiple encryptions. Cryptology ePrint Archive, Report 2002/089, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.89
    • Goldreich, O.1    Lustig, Y.2    Naor, M.3
  • 12
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • CRYPTO '91
    • C. Rackoff and D.R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO '91, volume 576 of LNCS, pages 433-444, 1991.
    • (1991) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 13
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO '84
    • A. Shamir, Identity-based cryptosystems and signature schemes. In CRYPTO '84, volume 196 of LNCS, pages 47-53, 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 14
    • 35248875140 scopus 로고    scopus 로고
    • Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
    • PKC '03
    • Y. Watanabe, J. Shikata, and H. Imai. Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. In PKC '03, volume 2567 of LNCS, pages 71-84, 2003.
    • (2003) LNCS , vol.2567 , pp. 71-84
    • Watanabe, Y.1    Shikata, J.2    Imai, H.3
  • 15
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • EUROCRYPT '05
    • B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT '05, volume 3494 of LNCS, pages 114-127, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.