메뉴 건너뛰기




Volumn 4043 LNCS, Issue , 2006, Pages 81-91

Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes

Author keywords

Certificate based and certificate less encryption; Cryptanalysis; Identity based encryption; Public key infrastructure

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; COMPUTER SCIENCE; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33746215222     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11774716_7     Document Type: Conference Paper
Times cited : (49)

References (16)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Advances in Cryptology - ASIACRYPT 2003, Springer-Verlag
    • S. Al-Riyami and K.G. Paterson. Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, LNCS vol. 2894, pp. 452-473, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.G.2
  • 2
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CL-PKE: A generic construction and efficient scheme
    • Public Key Cryptography - PKC 2005, Springer-Verlag
    • S. Al-Riyami and K.G. Paterson. CBE from CL-PKE: A generic construction and efficient scheme. Public Key Cryptography - PKC 2005, LNCS vol. 3386, pp. 398-415, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 398-415
    • Al-Riyami, S.1    Paterson, K.G.2
  • 3
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • Information Security Conference - ISC 2005, Springer-Verlag
    • J. Baek, R. Safavi-Naini and W. Susilo. Certificateless Public Key Encryption Without Pairing. Information Security Conference - ISC 2005, LNCS vol. 3650, pp. 134-148, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology - CRYPTO 1998, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Advances in Cryptology - CRYPTO 1998, LNCS vol. 1462, pp. 26-45, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption. From the weil pairing
    • Advances in Cryptology - Crypto 2001, Springer-Verlag
    • D. Boneh and M Franklin. Identity-Based Encryption. From The Weil Pairing, Advances in Cryptology - Crypto 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. ACM CCS 93, pp. 62-73, ACM Press, 1993.
    • (1993) ACM CCS 93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • ACM press
    • R. Canetti, O. Goldreich and S. Halevi. The random oracle methodology, revisited. Journal of the ACM vol. 51, num. 4, pp. 557-594, ACM press, 2004.
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 9
    • 84941156716 scopus 로고    scopus 로고
    • On proofs of security for certificateless cryptosystems
    • Report 2005/348
    • A. Dent and C. Kudla. On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348.
    • Cryptology EPrint Archive
    • Dent, A.1    Kudla, C.2
  • 10
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-ciphertext security of multiple encryption
    • Theory of Cryptography Conference - TCC 2005, Springer-Verlag
    • Y. Dodis and J. Katz. Chosen-Ciphertext Security of Multiple Encryption, Theory of Cryptography Conference - TCC 2005, LNCS vol. 3378, pp. 188-209, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 11
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate-revocation problem
    • Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
    • C. Gentry. Certificate-Based Encryption and the Certificate-Revocation Problem, Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, pp. 272-291, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 272-291
    • Gentry, C.1
  • 12
    • 58349122471 scopus 로고    scopus 로고
    • It is possible to have CBE from CL-PKE?
    • Report 2005/431
    • B.G. Kang and J.H. Park. It is possible to have CBE from CL-PKE? Cryptology ePrint Archive, Report 2005/431, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive
    • Kang, B.G.1    Park, J.H.2
  • 13
    • 33745833916 scopus 로고    scopus 로고
    • On constructing certificateless cryptosystems from identity based encryption
    • Public Key Cryptography 2006 - PKC 2006, Springer-Verlag
    • B. Libert and J.J. Quisquater. On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006 - PKC 2006, LNCS vol. 3958, pp. 474-490, Springer-Verlag, 2006.
    • (2006) LNCS , vol.3958 , pp. 474-490
    • Libert, B.1    Quisquater, J.J.2
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - Crypto 1984, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes, Advances in Cryptology - Crypto 1984, LNCS vol. 196, pp. 47-53, Springer-Verlag, 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 15
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • Computational Science and Its Applications - ICCSA 2004, Springer-Verlag
    • D.H. Yum and P.J. Lee. Generic Construction of Certificateless Encryption. In Computational Science and Its Applications - ICCSA 2004, LNCS vol. 3043, pp. 802-811, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3043 , pp. 802-811
    • Yum, D.H.1    Lee, P.J.2
  • 16
    • 33645601534 scopus 로고    scopus 로고
    • Identity-based cryptography in public key management
    • EuroPKI 2004, Springer-Verlag
    • D.H. Yum and P.J. Lee. Identity-based cryptography in public key management. In EuroPKI 2004, LNCS vol. 3093, pp. 71-84, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3093 , pp. 71-84
    • Yum, D.H.1    Lee, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.