메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 474-490

On constructing certificateless cryptosystems from identity based encryption

Author keywords

Bilinear maps; Certificateless encryption; Provable security

Indexed keywords

CODES (SYMBOLS); COMPUTER CRIME; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA; TEXT PROCESSING;

EID: 33745833916     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_31     Document Type: Conference Paper
Times cited : (146)

References (33)
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Asiacrypt'03, Springer
    • S. S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In Asiacrypt'03, volume 2894 of LNCS, pages 452-473. Springer, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.2
  • 3
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CL-PKE: A generic construction and efficient schemes
    • PKC'05, Springer
    • S. S. Al-Riyami and K. Paterson. CBE from CL-PKE: A generic construction and efficient schemes. In PKC'05, volume 3386 of LNCS, pages 398-415. Springer, 2005.
    • (2005) LNCS , vol.3386 , pp. 398-415
    • Al-Riyami, S.S.1    Paterson, K.2
  • 4
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • ISC'05, Springer
    • J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC'05, volume 3650 of LNCS, pages 134-148. Springer, 2005.
    • (2005) LNCS , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 5
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • SAC'03, Springer
    • P. S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In SAC'03, volume 3006 of LNCS, pages 17-25. Springer, 2003.
    • (2003) LNCS , vol.3006 , pp. 17-25
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 6
    • 27244440989 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • To Appear
    • P. S. L. M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. In SAC'05. To Appear.
    • SAC'05
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 7
    • 35048849890 scopus 로고    scopus 로고
    • Compressed pairings
    • Crypto'04, Springer
    • P. S. L. M. Barreto and M. Scott. Compressed pairings. In Crypto'04, volume 3152 of LNCS, pages 140-156. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 140-156
    • Barreto, P.S.L.M.1    Scott, M.2
  • 10
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Eurocrypt'04, Springer
    • D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 11
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Eurocrypt'04, Springer
    • D. Boneh and X. Boyen. Short signatures without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 56-73. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Crypto'01, Springer
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 13
    • 35248897599 scopus 로고    scopus 로고
    • A forward secure public key encryption scheme
    • Eurocrypt'03, Springer
    • R. Canetti, S. Halevi, and J. Katz. A forward secure public key encryption scheme. In Eurocrypt'03, volume 2656 of LNCS, pages 254-271. Springer, 2003.
    • (2003) LNCS , vol.2656 , pp. 254-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 14
    • 33645751214 scopus 로고    scopus 로고
    • Security proof of Sakai-Kasahara's identity-based encryption scheme
    • IMA Int. Conf. 2005, Springer
    • L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. In IMA Int. Conf. 2005, volume 3796 of LNCS, pages 442-459. Springer, 2005. Also available from http://eprint.iacr.org/2005/226.
    • (2005) LNCS , vol.3796 , pp. 442-459
    • Chen, L.1    Cheng, Z.2
  • 15
    • 38049109544 scopus 로고    scopus 로고
    • An efficient ID-KEM based on the Sakai-Kasahara key construction
    • L. Chen, Z. Cheng, J. Malone-Lee, and N. P. Smart. An efficient ID-KEM based on the Sakai-Kasahara key construction. Cryptology ePrint Archive, Report 2005/224, 2005. http://eprint.iacr.org/2005/224.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.224
    • Chen, L.1    Cheng, Z.2    Malone-Lee, J.3    Smart, N.P.4
  • 16
    • 33744808601 scopus 로고    scopus 로고
    • Efficient certificateless public key encryption
    • Z. Cheng and R. Comley. Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012, 2005. http://eprint.iacr.org/2005/012.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.12
    • Cheng, Z.1    Comley, R.2
  • 17
    • 84941147192 scopus 로고    scopus 로고
    • On proofs of security for certificateless cryptosystems
    • A. Dent and C. Kudla. On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348, 2005. http://eprint.iacr.org/2005/348.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.348
    • Dent, A.1    Kudla, C.2
  • 18
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-ciphertext security of multiple encryption
    • TCC'05, Springer
    • Y. Dodis and J. Katz. Chosen-ciphertext security of multiple encryption. In TCC'05, volume 3378 of LNCS, pages 188-209. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 19
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • PKC'99, Springer
    • E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In PKC'99, volume 1560 of LNCS, pages 53-68. Springer, 1999.
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 20
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Crypto'99, Springer
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Crypto'99, volume 1666 of LNCS, pages 537-554. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 21
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Crypto'84, Springer
    • T. E. Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Crypto'84, volume 196 of LNCS, pages 10-18. Springer, 1985.
    • (1985) LNCS , vol.196 , pp. 10-18
    • Gamal, T.E.1
  • 22
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Euror-ypt'03, Springer
    • C. Gentry. Certificate-based encryption and the certificate revocation problem. In Euror-ypt'03, volume 2656 of LNCS, pages 272-293. Springer, 2003.
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 23
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Eurocrypt'91, Springer
    • M. Girault. Self-certified public keys. In Eurocrypt'91, volume 547 of LNCS, pages 490-497. Springer, 1991.
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 24
    • 33645598062 scopus 로고    scopus 로고
    • A certificate-based signature scheme
    • CTRSA'04, Springer
    • G. Kang and S. H. H. J. H. Park. A certificate-based signature scheme. In CTRSA'04, volume 2964 of LNCS, pages 99-111. Springer, 2004.
    • (2004) LNCS , vol.2964 , pp. 99-111
    • Kang, G.1    Park, S.H.H.J.H.2
  • 25
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5):1234-1243, 2001.
    • (2001) IEICE Transactions on Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 26
    • 33645608384 scopus 로고    scopus 로고
    • ID-based cryptosystems with pairing on elliptic curve
    • Hamamatsu, Japan
    • R. Sakai and M. Kasahara. ID-based cryptosystems with pairing on elliptic curve. In SCIS'03, Hamamatsu, Japan, 2003. http://eprint.iacr.org/2003/054.
    • (2003) SCIS'03
    • Sakai, R.1    Kasahara, M.2
  • 27
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Crypto'84, Springer
    • A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 196 of LNCS, pages 47-53. Springer, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 28
    • 33646817646 scopus 로고    scopus 로고
    • On computable isomorphisms in efficient pairing based systems
    • N. P. Smart and F. Vercauteren. On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116, 2005. http://eprint.iacr.org/2005/116.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.116
    • Smart, N.P.1    Vercauteren, F.2
  • 29
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • ICCSA'04, Springer
    • D. H. Yum and P. J. Lee. Generic construction of certificateless encryption. In ICCSA'04, volume 3043 of LNCS, pages 802-811. Springer, 2004.
    • (2004) LNCS , vol.3043 , pp. 802-811
    • Yum, D.H.1    Lee, P.J.2
  • 30
    • 35048832495 scopus 로고    scopus 로고
    • Generic construction of certificateless signature
    • ACISP'04, Springer
    • D. H. Yum and P. J. Lee. Generic construction of certificateless signature. In ACISP'04, volume 3108 of LNCS, pages 200-211. Springer, 2004.
    • (2004) LNCS , vol.3108 , pp. 200-211
    • Yum, D.H.1    Lee, P.J.2
  • 31
    • 33645601534 scopus 로고    scopus 로고
    • Identity-based cryptography in public key management
    • EuroPKI'04, Springer
    • D. H. Yum and P. J. Lee. Identity-based cryptography in public key management. In EuroPKI'04, volume 3093 of LNCS, pages 71-84. Springer, 2004.
    • (2004) LNCS , vol.3093 , pp. 71-84
    • Yum, D.H.1    Lee, P.J.2
  • 32
    • 33745822106 scopus 로고    scopus 로고
    • On the security of multiple encryption or CCA-security+CCA-security=CCA-security?
    • PKC'04, Springer
    • R. Zhang, G. Hanaoka, J. Shikata and H. Imai. On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? In PKC'04, volume 2947 of LNCS, pages 360-374. Springer, 2004.
    • (2004) LNCS , vol.2947 , pp. 360-374
    • Zhang, R.1    Hanaoka, G.2    Shikata, J.3    Imai, H.4
  • 33
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • PKC'04, Springer
    • F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC'04, volume 2947 of LNCS, pages 277-290. Springer, 2004.
    • (2004) LNCS , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.