메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 293-308

Certificateless public-key signature: Security model and efficient construction

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; COMPUTER SCIENCE; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33746591632     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_20     Document Type: Conference Paper
Times cited : (256)

References (20)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Advances in Cryptology-Asiacrypt'2003, Springer-Verlag
    • S. Al-Riyami and K. Paterson, Certificateless public key cryptography, Advances in Cryptology-Asiacrypt'2003, Lecture Notes in Computer Science, vol. 2894, pages 452-473, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 2
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CL-PKE: A generic construction and efficient schemes
    • Public Key Cryptography-PKC'05, Springer-Verlag
    • S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient schemes", Public Key Cryptography-PKC'05, Lecture Notes in Computer Science, vol. 3386, pages 398-415, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 398-415
    • Al-Riyami, S.1    Paterson, K.2
  • 3
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Advances in Cryptology-Crypto'2002, Springer-Verlag
    • P. Barreto, H. Kim, B. Lynn and M. Scott, Efficient algorithms for pairing-based cryptosystems, Advances in Cryptology-Crypto'2002, Lecture Notes in Computer Science, vol. 2442, pages 354-368, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology-Crypto'2001, Springer-Verlag
    • D. Boneh and F. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto'2001, Lecture Notes in Computer Science, vol. 2139, pages 213-229, Springer-Verlag, 2001;
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, F.2
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • SIAM J. COMPUT., 32(3): 586-615, 2003.
    • (2003) SIAM J. COMPUT. , vol.32 , Issue.3 , pp. 586-615
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Advances in Cryptology-Asiacrypt'2001, Springer-Verlag
    • D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt'2001, Lecture Notes in Computer Science, vol. 2248, pages 514-532, Springer-Verlag;
    • Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 5644232839 scopus 로고    scopus 로고
    • J. Cryptology, 17(4): 297-319, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
  • 9
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • Proc. of the 8th Information Security Conference (ISC 2005), Springer-Verlag
    • J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, Proc. of the 8th Information Security Conference (ISC 2005), Lecture Notes in Computer Science, vol. 3650, pages 134-148, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 10
    • 84944050090 scopus 로고    scopus 로고
    • Applications of multiple trust authorities in pairing based cryptosystems
    • InfraSec 2002, Springer-Verlag
    • L. Chen, K. Harrison, N. P. Smart, and D. Soldera, Applications of multiple trust authorities in pairing based cryptosystems, InfraSec 2002, Lecture Notes in Computer Science, vol. 2437, pages 260-275, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2437 , pp. 260-275
    • Chen, L.1    Harrison, K.2    Smart, N.P.3    Soldera, D.4
  • 12
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of Pull Domain Hash
    • Advances in Cryptology-Crypto'00, Springer-Verlag
    • J.S. Coron. On the exact security of Pull Domain Hash. Advances in Cryptology-Crypto'00, Lecture Notes in Computer Science, vol.1880, pages 229-235, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 229-235
    • Coron, J.S.1
  • 13
    • 84941147192 scopus 로고    scopus 로고
    • On proofs of security for certificateless cryptosystems
    • A.W. Dent and C. Kudla, On proofs of security for certificateless cryptosystems, IACR Cryptology ePrint Archive, Report 2005/348, 2005
    • (2005) IACR Cryptology EPrint Archive, Report , vol.2005 , Issue.348
    • Dent, A.W.1    Kudla, C.2
  • 14
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Advances in Cryptology-Eurocrypt'2003, Springer-Verlag
    • C. Gentry, Certificate-based encryption and the certificate revocation problem, Advances in Cryptology-Eurocrypt'2003, Lecture Notes in Computer Science, vol. 2656, pages 272-293, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 15
    • 33744786523 scopus 로고    scopus 로고
    • On the security of a certificateless signature scheme
    • Cryptology and Network Security: 4th International Conference, Springer-Verlag
    • X.Y. Huang, W. Susilo, Y. Mu and F.T. Zhang, On the security of a certificateless signature scheme. Cryptology and Network Security: 4th International Conference, Lecture Notes in Computer Science, vol.3810, pages 13-25, Springer-Verlag, 2005
    • (2005) Lecture Notes in Computer Science , vol.3810 , pp. 13-25
    • Huang, X.Y.1    Susilo, W.2    Mu, Y.3    Zhang, F.T.4
  • 16
    • 23944473052 scopus 로고    scopus 로고
    • The exact security of an identity based signature and its applications
    • B. Libert and J.J. Quisquater. The exact security of an identity based signature and its applications, IACR Cryptology ePrint Archive, Report 2004/102, 2004.
    • (2004) IACR Cryptology EPrint Archive, Report , vol.2004 , Issue.102
    • Libert, B.1    Quisquater, J.J.2
  • 17
    • 35048847949 scopus 로고    scopus 로고
    • What is possible with identity based cryptography for PKIs and what still must be improved
    • EuroPKI 2004, Springer-Verlag
    • B. Libert and J.J. Quisquater, What is possible with identity based cryptography for PKIs and what still must be improved, EuroPKI 2004, Lecture Notes in Computer Science, vol. 3093, pages 57-70, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3093 , pp. 57-70
    • Libert, B.1    Quisquater, J.J.2
  • 18
    • 84941163802 scopus 로고    scopus 로고
    • The pairing-based crypto lounge
    • The pairing-Based Crypto Lounge.. Web page maintained by Paulo Barreto. Available at: http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html
    • Web Page Maintained by Paulo Barreto
  • 19
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Advances in Cryptology-Crypto'84, Springer-Verlag
    • A.Shamir, Identity based cryptosystems and signature schemes, Advances in Cryptology-Crypto'84, Lecture Notes in Computer Science, vol.196, pages 47-53, Springer-Verlag, 1984.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 20
    • 35048832495 scopus 로고    scopus 로고
    • Generic construction of certificateless signature
    • Proc. of Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Springer-Verlag
    • D.H. Yum and P.J. Lee, Generic construction of certificateless signature. Proc. of Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Lecture Notes in Computer Science, vol.3108, pages 200-211, Springer-Verlag, 2004
    • (2004) Lecture Notes in Computer Science , vol.3108 , pp. 200-211
    • Yum, D.H.1    Lee, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.