메뉴 건너뛰기




Volumn 85, Issue , 2004, Pages 119-124

ID-based threshold decryption without random oracles and its application in key escrow

Author keywords

ID based cryptography; Key escrow; Threshold decryption

Indexed keywords

CIPHERTEXTS; DIFFIE HELLMAN; ID-BASED; ID-BASED CRYPTOGRAPHY; KEY ESCROW; PLAINTEXT; RANDOM ORACLE; THRESHOLD DECRYPTION; VALIDATION TEST;

EID: 33745652236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1046290.1046314     Document Type: Conference Paper
Times cited : (22)

References (11)
  • 1
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Advances in Cryptology-Crypto 84
    • A. Shamir. Identity based cryptosystems and signature schemes. Advances in Cryptology-Crypto 84, LNCS, 196:47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - Crypto 2001
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. Advances in Cryptology - Crypto 2001, LNCS, 2193:213-229, 2001.
    • (2001) LNCS , vol.2193 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • Advances in Cryptology-Eurocryjpt 04
    • D. Boneh and X. Boyen. Efficient selective-id secure identity based encryption without random oracles. Advances in Cryptology-Eurocryjpt 04, LNCS, 3027:223-238, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and coding
    • C. Cocks. An identity based encryption scheme based on quadratic residues. Cryptography and coding, LNCS, 2260:360-363, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 5
    • 0035416443 scopus 로고    scopus 로고
    • A threshold key escrow scheme based on public key cryptosystem
    • August
    • Z. Cao. A threshold key escrow scheme based on public key cryptosystem. Science in China(series E), 44(4):441-448, August 2001.
    • (2001) Science in China(series E) , vol.44 , Issue.4 , pp. 441-448
    • Cao, Z.1
  • 6
    • 0141719369 scopus 로고    scopus 로고
    • Two classes of robust threshold key escrow schemes
    • (in chinese). June
    • Z. Cao. Two classes of robust threshold key escrow schemes(in chinese). Journal of Software, 14(06):1164-1171, June 2003.
    • (2003) Journal of Software , vol.14 , Issue.6 , pp. 1164-1171
    • Cao, Z.1
  • 8
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • Proceedings of Asiacrypt 2002
    • C. Gentry and A. Silverberg. Hierarchical id-based cryptography. Proceedings of Asiacrypt 2002, LNCS, 2501:548-566, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 10
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notations of security for public key encryption schemes
    • Advances in Cryptology-Proceedings of Crypto 98
    • D. M. Bellare, A. Desai and P. Rogaway. Relations among notations of security for public key encryption schemes. Advances in Cryptology-Proceedings of Crypto 98, LNCS, 1462:26-45, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, D.M.1    Desai, A.2    Rogaway, P.3
  • 11
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Advances in Cryptology-Eurocrypt'98
    • V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Advances in Cryptology-Eurocrypt'98, LNCS, 1403:1-16, 1998.
    • (1998) LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.