메뉴 건너뛰기




Volumn 3841 LNCS, Issue , 2006, Pages 720-725

Modified ID-based threshold decryption and its application to mediated ID-based encryption

Author keywords

[No Author keywords available]

Indexed keywords

BILINEAR DIFFIE-HELLMAN INVERSION ASSUMPTION; ID BASED ENCRYPTION SCHEMES; RANDOM ORACLES; THRESHOLD DECRYPTION;

EID: 33745673615     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11610113_64     Document Type: Conference Paper
Times cited : (7)

References (10)
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective id secure identity based encryption without random oracles
    • Advances in Cryptology-Proceedings of EUROCRYPT'04, Springer
    • D.Boneh and X.Boyen, Efficient selective id secure identity based encryption without random oracles, In Advances in Cryptology-Proceedings of EUROCRYPT'04, volume 3027 of Lecture Notes in Computer Science, pages 223-238, Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology-Proceedings of EUROCRYPT'05, Springer
    • D.Boneh and X.Boyen, Hierarchical Identity Based Encryption with Constant Size Ciphertext, In Advances in Cryptology-Proceedings of EUROCRYPT'05, volume 3494 of Lecture Notes in Computer Science, pages 440-456. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-CRYPTO 2001, Springer-Verlag
    • D.Boneh and M.Franklin, Identity-based encryption from the Weil pairing, In Advances in Cryptology-CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35048840186 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptogrpahy (PKC'04), Springer-Verlag
    • Joonsang Baek and Yuliang Zheng, Identity-Based Threshold Decryption, Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptogrpahy (PKC'04), LNCS, vol. 2947, Springer-Verlag, 2004, pp. 262-276.
    • (2004) LNCS , vol.2947 , pp. 262-276
    • Baek, J.1    Zheng, Y.2
  • 7
    • 33745652236 scopus 로고    scopus 로고
    • ID-based threshold decryption without random oracles and its application in key escrow
    • Proceedings of the 3rd international conference on Information security
    • Zhenchuan Chai, Zhenfu Cao, and Rongxing Lu, ID-based Threshold Decryption without Random Oracles and its Application in Key Escrow, In Proceedings of the 3rd international conference on Information security, ACM International Conference Proceeding Series, 2004.
    • (2004) ACM International Conference Proceeding Series
    • Chai, Z.1    Cao, Z.2    Lu, R.3
  • 8
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Advances in Cryptology-Proceedings of CRYPTO'92, Springer-Verlag
    • D.Chaum and T.P. Pedersen, Wallet databases with observers, In Advances in Cryptology-Proceedings of CRYPTO'92, volume 740 of Lecture Notes in Computer Science, pages 89-105, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 10
    • 33745324657 scopus 로고    scopus 로고
    • Efficient revocation of dynamic security privileges in hierarchically structured communities
    • Fredericton, New Brunswick, Canada, October 13-15
    • D. Nali, A. Miri, and C. Adams, Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities, Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, New Brunswick, Canada, October 13-15, 2004, pp. 219-223.
    • (2004) Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004) , pp. 219-223
    • Nali, D.1    Miri, A.2    Adams, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.