메뉴 건너뛰기




Volumn 4058 LNCS, Issue , 2006, Pages 348-359

Generic transforms to acquire CCA-security for identity based encryption: The cases of FOPKC and REACT

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PROBLEM SOLVING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33746332411     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11780656_29     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 1
    • 33745632083 scopus 로고    scopus 로고
    • Relations among notions of security for identity based encryption schemes
    • Latin American Theoretical Informatics (LATIN '06). Springer
    • N. Attrapadung, Y. Cui, D. Galindo, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang, and R. Zhang. Relations among notions of security for identity based encryption schemes. In Latin American Theoretical Informatics (LATIN '06), volume 3887 of LNCS, pages 130-141. Springer, 2006.
    • (2006) LNCS , vol.3887 , pp. 130-141
    • Attrapadung, N.1    Cui, Y.2    Galindo, D.3    Hanaoka, G.4    Hasuo, I.5    Imai, H.6    Matsuura, K.7    Yang, P.8    Zhang, R.9
  • 2
    • 27244435853 scopus 로고    scopus 로고
    • A note on effcient computation of cube roots in characteristic 3
    • P.S.L.M. Barreto. A note on effcient computation of cube roots in characteristic 3. Cryptology ePrint Archive, Report 2004/305, 2004. http://eprint.iacr.org/2004/305.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.305
    • Barreto, P.S.L.M.1
  • 3
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • Advances in Cryptology - EUROCRYPT '96. Springer
    • M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. In Advances in Cryptology - EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer, 1996.
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID identity based encryption without random oracles
    • Advances in Cryptology - EUROCRYPT '04. Springer
    • D. Boneh and X. Boyen. Efficient selective-ID identity based encryption without random oracles. In Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Advances in Cryptology - CRYPTO '04. Springer
    • D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In Advances in Cryptology - CRYPTO '04, volume 3152 of LNCS, pages 443-459. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology - CRYPTO '01. Springer
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology - CRYPTO '01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Full version of [6]
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003. Full version of [6].
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Advances in Cryptology - EUROCRYPT '04. Springer
    • R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 207-222. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 9
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Proc. of the 8th IMA international conference on cryptography and coding. Springer
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In Proc. of the 8th IMA international conference on cryptography and coding, volume 2260 of LNCS, pages 360-363. Springer, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology - CRYPTO '86. Springer
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 186-194. Springer, 1987.
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • Proc. of Public Key Cryptography 1999. Springer
    • E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In Proc. of Public Key Cryptography 1999, volume 1560 of LNCS, pages 53-68. Springer, 1999.
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 12
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Advances in Cryptology - CRYPTO '99. Springer
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 537-554. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 13
    • 0033908504 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • Full version of [11]
    • E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. IEICE Transactions Fundamentals, E83-A(1):24-32, 2000. Full version of [11].
    • (2000) IEICE Transactions Fundamentals , vol.E83-A , Issue.1 , pp. 24-32
    • Fujisaki, E.1    Okamoto, T.2
  • 14
    • 26444618568 scopus 로고    scopus 로고
    • Boneh-Franklin identity based encryption revisited
    • Proc. of 32nd ICALP. Springer
    • D. Galindo. Boneh-Franklin Identity Based Encryption Revisited. In Proc. of 32nd ICALP, volume 3580 of LNCS, pages 791-802. Springer, 2005.
    • (2005) LNCS , vol.3580 , pp. 791-802
    • Galindo, D.1
  • 15
    • 27244434197 scopus 로고    scopus 로고
    • Efficient hardware for the Tate pairing calculation in characteristic three
    • Cryptographic Hardware and Embedded Systems - CUES 2005. Springer
    • T. Kerius, W.P. Marnane, E.M. Popovici, and P.S.L.M. Barreto. Efficient hardware for the Tate pairing calculation in characteristic three. In Cryptographic Hardware and Embedded Systems - CUES 2005, volume 3659 of LNCS, pages 412-426. Springer, 2005. Presentation file is available from http://islab.oregonstate.edu/ches/ches2005/presentations/.
    • (2005) LNCS , vol.3659 , pp. 412-426
    • Kerius, T.1    Marnane, W.P.2    Popovici, E.M.3    Barreto, P.S.L.M.4
  • 16
    • 26444602504 scopus 로고    scopus 로고
    • Identity based encryption without redundancy
    • Proc. of ACNS '05. Springer
    • B. Libert and J.J. Quisquater. Identity based encryption without redundancy. In Proc. of ACNS '05, volume 3531 of LNCS, pages 285-300. Springer, 2005.
    • (2005) LNCS , vol.3531 , pp. 285-300
    • Libert, B.1    Quisquater, J.J.2
  • 17
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • Topics in Cryptology - CT-RSA '01. Springer
    • T. Okamoto and D. Pointcheval. REACT: rapid enhanced-security asymmetric cryptosystem transform. In Topics in Cryptology - CT-RSA '01, volume 2020 of LNCS, pages 159-174. Springer, 2001.
    • (2001) LNCS , vol.2020 , pp. 159-174
    • Okamoto, T.1    Pointcheval, D.2
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - CRYPTO '84. Springer
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, volume 196 of LNCS, pages 47-53. Springer, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Advances in Cryptology - EUROCRYPT '05. Springer
    • B. Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology - EUROCRYPT '05, volume 3494 of LNCS, pages 114-127. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 20
    • 33745678280 scopus 로고    scopus 로고
    • Applying Fujisaki-Okamoto to identity-based encryption
    • Proc. of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. Springer
    • P. Yang, T. Kitagawa, G. Hanaoka, R. Zhang, K. Matsuura, and H. Imai. Applying Fujisaki-Okamoto to identity-based encryption. In Proc. of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, volume 3857 of LNCS, pages 183-192. Springer, 2006.
    • (2006) LNCS , vol.3857 , pp. 183-192
    • Yang, P.1    Kitagawa, T.2    Hanaoka, G.3    Zhang, R.4    Matsuura, K.5    Imai, H.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.