메뉴 건너뛰기




Volumn 3935 LNCS, Issue , 2006, Pages 424-440

Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model

Author keywords

Identity based encryption; Parameter size; Security; Standard model

Indexed keywords

COST EFFECTIVENESS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33745840439     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734727_33     Document Type: Conference Paper
Times cited : (63)

References (25)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • DHIES: An encryption scheme based on the Diffie-Hellman problem
    • Lecture Notes in Computer Science, Springer-Verlag
    • M. Abdalla, M. Bellare and P. Rogaway. DHIES: An encryption scheme based on the Diffie-Hellman problem, Proceedings of CT-RSA 2001, Lecture Notes in Computer Science, Springer-Verlag, pages 143-158.
    • Proceedings of CT-RSA 2001 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • EUROCRYPT 2004
    • D. Boneh, X. Boyen. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, EUROCRYPT 2004, LNCS, pp 223-238.
    • LNCS , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • EUROCRYPT 2005
    • D. Boneh, X. Boyen, E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, Vol. 3494 of LNCS, pp 440-456.
    • LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • CRYPTO - 2001
    • D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. CRYPTO - 2001, volume 2139 of LNCS, pp. 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity based encryption
    • Proceedings of RSA-CT '05
    • D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. In Proceedings of RSA-CT '05, LNCS 3376, pp. 87-103, 2005.
    • (2005) LNCS , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 9
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • CRYPTO 2002
    • P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. CRYPTO 2002, LNCS 2442, pp. 354-368.
    • LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 10
    • 27244440989 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • Accepted for presentation at SAC 2005
    • P. S. L. M. Barreto and M. Naehrig. Pairing-Friendly Elliptic Curves of Prime Order. Cryptology ePrint Archive, Report 2005/133. Available from http://eprint.iacr.org/2005/133/. Accepted for presentation at SAC 2005.
    • Cryptology EPrint Archive, Report , vol.2005 , Issue.133
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 12
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • To appear. This version is available from Cryptology ePrint Archive, Report 2005/288
    • X. Boyen, Q. Mei and B. Waters. Direct Chosen Ciphertext Security from Identity-Based Techniques. In 12th ACM Conference on Computer and Communication Security - CCS 2005, To appear. This version is available from Cryptology ePrint Archive, Report 2005/288.
    • 12th ACM Conference on Computer and Communication Security - CCS 2005
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 14
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • EUROCRYPT 2003
    • R. Canetti, S. Halevi and J. Katz. A Forward-Secure Public-Key Encryption Scheme. In EUROCRYPT 2003, Volume 2656 of LNCS, pp 255-271. 2003.
    • (2003) LNCS , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 15
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity based encryption
    • Proceedings of Eurocrypt 2004
    • R. Canetti, S. Halevi and J. Katz. Chosen-ciphertext Security from Identity Based Encryption. In Proceedings of Eurocrypt 2004- LNCS, 2004.
    • (2004) LNCS
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 84911480395 scopus 로고    scopus 로고
    • The exact security of pairing based encryption and signature schemes
    • Talk, INRIA, Paris. November 3-5, Available from author's website
    • D. Galindo. The Exact Security of Pairing Based Encryption and Signature Schemes. Talk at Workshop on Provable Security, INRIA, Paris. November 3-5, 2004. Available from author's website.
    • (2004) Workshop on Provable Security
    • Galindo, D.1
  • 17
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the tate pairing
    • ANTS V
    • S. Galbraith, K. Harrison and D. Soldera. Implementing the Tate Pairing. ANTS V, LNCS 2369, pp. 324-337, 2002.
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 18
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • ASIACRYPT 2002
    • C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, ASIACRYPT 2002, LNCS, 2002.
    • (2002) LNCS
    • Gentry, C.1    Silverberg, A.2
  • 19
    • 84947242701 scopus 로고    scopus 로고
    • Towards hierarchical identity-based encryption
    • J. Horwitz and B. Lynn. Towards Hierarchical Identity-Based Encryption. In EUROCRYPT 2002, pp 466-481, 2002.
    • (2002) EUROCRYPT 2002 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 20
    • 11344280768 scopus 로고    scopus 로고
    • Another look at "provable security"
    • Cryptology ePrint Archive, Report 2004/152, final version (to appear in)
    • N. Koblitz and A. Menezes, Another look at "provable security", Cryptology ePrint Archive, Report 2004/152, http://eprint.iacr.org/2004/152/, final version (to appear in Journal of Cryptology).
    • Journal of Cryptology
    • Koblitz, N.1    Menezes, A.2
  • 21
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Jr. Cryptology 14(4), pp. 255-293 (2001)
    • (2001) Jr. Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 22
    • 35048854690 scopus 로고    scopus 로고
    • HEAD: Hybrid encryption with delegated decryption capability
    • Proceedings of Indocrypt 2004
    • P. Sarkar, HEAD: Hybrid Encryption with Delegated Decryption Capability, Proceedings of Indocrypt 2004, LNCS, pp 230-244.
    • LNCS , pp. 230-244
    • Sarkar, P.1
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO 84
    • A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 84, LNCS, pp 47-53, 1985.
    • (1985) LNCS , pp. 47-53
    • Shamir, A.1
  • 24
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Eurocrypt 2005, Eurocrypt 2005
    • B. Waters. Efficient Identity-Based Encryption Without Random Oracles. Eurocrypt 2005, Eurocrypt 2005, Vol. 3494 of LNCS
    • LNCS , vol.3494
    • Waters, B.1
  • 25


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.