메뉴 건너뛰기




Volumn 4004 LNCS, Issue , 2006, Pages 445-464

Practical identity-based encryption without random oracles

Author keywords

Identity Based Encryption

Indexed keywords

BROADCASTING; COMPUTER PROGRAMMING LANGUAGES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; QUERY LANGUAGES; SECURITY OF DATA;

EID: 33746062799     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11761679_27     Document Type: Conference Paper
Times cited : (696)

References (27)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • Advances in Cryptology - Crypto 2005 Springer-Verlag
    • M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 205-222. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proc. of ACM CCS, pages 62-73, 1993.
    • (1993) Proc. of ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID identity based encryption without random oracles
    • Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
    • D. Boneh and X. Boyen. Efficient Selective-ID Identity Based Encryption without Random Oracles. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Advances in Cryptology - Crypto 2004, Springer-Verlag
    • D. Boneh and X. Boyen. Secure Identity Based Encryption without Random Oracles. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 443-459. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based Encryption with constant size ciphertext
    • Advances in Cryptology - Eurocrypt 2005, Springer-Verlag
    • D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 440-456. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 7
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Advances in Cryptology - Eurocrypt Springer-Verlag 2004
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 506-522. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • Advances in Cryptology - Crypto Springer-Verlag. 2001
    • D. Boneh and M. Franklin. Identity Based Encryption from the Weil pairing. In Advances in Cryptology - Crypto 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity Based Encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 10
    • 33745166648 scopus 로고    scopus 로고
    • Collusion-resistant broadcast encryption with short ciphertexts and private keys
    • Advances in Cryptology - Crypto 2005, Springer-Verlag
    • D. Boneh, C. Gentry, and B. Waters. Collusion-Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 258-275. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 11
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity based encryption
    • Proc. of CT-RSA, Springer-Verlag
    • D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. In Proc. of CT-RSA, volume 3376 of LNCS, pages 87-103. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 12
    • 84946840347 scopus 로고    scopus 로고
    • Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248 Springer
    • D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248 (2001), Springer, 514-532.
    • (2001) Short Signatures from the Weil Pairing , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 13
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity based techniques
    • X. Boyen, Q. Mie and B. Waters, Direct Chosen Ciphertext Security from Identity Based Techniques, In Proc. of ACM CCS, pages 320-329, 2005.
    • (2005) Proc. of ACM CCS , pp. 320-329
    • Boyen, X.1    Mie, Q.2    Waters, B.3
  • 15
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
    • R. Canetti, S. Halevi, and J. Katz. A Forward-Secure Public-Key Encryption Scheme. In Advances in Cryptology - Eurocrypt 2003, volume 2656 of LNCS, pages 255-271. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
    • R. Canetti, S. Halevi, and J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 207-222. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 17
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attacks
    • Advances in Cryptology - Crypto 1998, Springer-Verlag
    • R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attacks. In Advances in Cryptology - Crypto 1998, volume 1462 of LNCS, pages 13-25. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 18
    • 84890013435 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • R. Cramer and V. Shoup. Signature Schemes Based on the Strong RSA Assumption. In Proc. of ACM CCS, pages 46-51, 1999.
    • (1999) Proc. of ACM CCS , pp. 46-51
    • Cramer, R.1    Shoup, V.2
  • 19
    • 84958742006 scopus 로고    scopus 로고
    • Efficient construction of (Distributed) verifiable random functions
    • Proc. of Public Key Cryptography, Springer-Verlag
    • Y. Dodis. Efficient Construction of (Distributed) Verifiable Random Functions. In Proc. of Public Key Cryptography, volume 2567 of LNCS, pages 1-17. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2567 , pp. 1-17
    • Dodis, Y.1
  • 20
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Proc. of Public Key Cryptography, Springer-Verlag
    • Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. In Proc. of Public Key Cryptography, volume 3386 of LNCS, pages 416-431. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 21
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Advances in Cryptology - Asiacrypt 2002, Springer-Verlag
    • C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In Advances in Cryptology - Asiacrypt 2002, volume 2501 of LNCS, pages 548-566. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 22
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
    • J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. In Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 466-481. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 23
    • 18744364723 scopus 로고    scopus 로고
    • Efficiency improvements for signature schemes with tight security reductions
    • J. Katz and N. Wang. Efficiency Improvements for Signature Schemes with Tight Security Reductions. In Proc. of ACM CCS, pages 155-164, 2003.
    • (2003) Proc. of ACM CCS , pp. 155-164
    • Katz, J.1    Wang, N.2
  • 24
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm Of hybrid encryption scheme
    • Advances in Cryptology - Crypto 2004, Springer-Verlag
    • K. Kurosawa and Y. Desmedt. A New Paradigm of Hybrid Encryption Scheme. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 426-442. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 25
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - Crypto 1984, Springer-Verlag
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology - Crypto 1984, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 26
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Advances in Cryptology - Eurocrypt 1997, Springer-Verlag
    • V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In Advances in Cryptology - Eurocrypt 1997, volume 1233 of LNCS, pages 256-266. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 27
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Advances in Cryptology - Eurocrypt 2005, Springer-Verlag
    • B. Waters. Efficient Identity-Based Encryption without Random Oracles. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 114-127. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.