메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 321-331

Identity-based registry for secure interdomain routing

Author keywords

Authorized search; Identity based registry; Verifiable search

Indexed keywords

AUTHENTICATION; COMPUTER OPERATING SYSTEMS; DATA STORAGE EQUIPMENT; INTERNET; ONLINE SEARCHING; ROUTING PROTOCOLS;

EID: 34247362891     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128866     Document Type: Conference Paper
Times cited : (5)

References (36)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    • Advances in Cryptology, CRYPTO 2005, of, Springer-Verlag
    • M. Abdalla, M. Bellaro, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In. Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 205-222. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellaro, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 5
    • 33744908786 scopus 로고    scopus 로고
    • Privacy-Enhanced Searches Using Encrypted Bloom Filters
    • AT&T Labs, Research, Feb
    • S. M. Bellovin and W. R. Cheswick. Privacy-Enhanced Searches Using Encrypted Bloom Filters. Technical Report Draft, AT&T Labs - Research, Feb 2004.
    • (2004) Technical Report Draft
    • Bellovin, S.M.1    Cheswick, W.R.2
  • 6
    • 35048901123 scopus 로고    scopus 로고
    • Public-Key Encryption with keyword Search
    • Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
    • D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-Key Encryption with keyword Search. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Mar
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing, 32(3):586-615, Mar 2003.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography
    • Advances in Cryptology, CRYPTO 2003, of, Springer-Verlag
    • X. Boyen. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 383-399. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 11
    • 34247382752 scopus 로고    scopus 로고
    • K. Butler, T. Farley, and P. McDaniel. A Survey of BGP Security. Technical Report TD-5UGJ33, AT&T Labs - Research, Feb 2004.
    • K. Butler, T. Farley, and P. McDaniel. A Survey of BGP Security. Technical Report TD-5UGJ33, AT&T Labs - Research, Feb 2004.
  • 12
    • 34748812366 scopus 로고    scopus 로고
    • Privacy Preserving Keyword Searches on Romote Encrypted Data. Cryptology ePrint Archive
    • Report 2004/051, Available at
    • Y.-C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Romote Encrypted Data. Cryptology ePrint Archive, Report 2004/051, 2004. Available at http://eprint.iacr.org/2004/051/.
    • (2004)
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 13
    • 84921068281 scopus 로고    scopus 로고
    • On the Exact Security of Full Domain Hash
    • Advances in Cryptology, CRYPTO 2000, of, Springer-Verlag
    • J.-S. Coron. On the Exact Security of Full Domain Hash. In Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229-235. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 14
    • 34247363892 scopus 로고    scopus 로고
    • Secure Indexes. Cryptology ePrint Archive
    • Report 2003/216, Available at
    • E.-J. Goh. Secure Indexes. Cryptology ePrint Archive, Report 2003/216, 2003. Available at http://sprint.iacr.org/2003/216/.
    • (2003)
    • Goh, E.-J.1
  • 15
    • 33745120364 scopus 로고    scopus 로고
    • Secure Conjunctive Keyword Search over Encrypted Data
    • Proceedings of the 2nd International Conference on Applied Cryptography and Network Security ACNS, of, Springer-Verlag
    • P. Golle, J. Staddon, and B. Waters. Secure Conjunctive Keyword Search over Encrypted Data. In Proceedings of the 2nd International Conference on Applied Cryptography and Network Security (ACNS), volume 3089 of Lecture Notes in Computer Science, pages 31-45. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 18
    • 34247369605 scopus 로고    scopus 로고
    • Internet Routing Registry
    • Internet Routing Registry. http://www.irr.net.
  • 22
    • 23944473052 scopus 로고    scopus 로고
    • The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive
    • Report 2004/102, Available at
    • B. Libert and J.-J. Quisquater. The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102, 2004. Available at http://eprint.iacr.org/2004/102.
    • (2004)
    • Libert, B.1    Quisquater, J.-J.2
  • 27
    • 23944469009 scopus 로고    scopus 로고
    • Public Key Encryption with Conjunctive Field Keyword Search
    • Proceedings of the 5th International Workshop on Information Security Applications WISA, of, Springer-Verlag
    • D. J. Park, K. Kim, and P. J. Lee. Public Key Encryption with Conjunctive Field Keyword Search. In Proceedings of the 5th International Workshop on Information Security Applications (WISA), volume 3325 of Lecture Notes in Computer Science, pages 73-86. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 73-86
    • Park, D.J.1    Kim, K.2    Lee, P.J.3
  • 29
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Advances in Cryptology, CRYPTO '84, of, Springer-Verlag
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In. Advances in Cryptology - CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 31
    • 34247393522 scopus 로고    scopus 로고
    • Stanford Applied Crypto Group
    • Stanford Applied Crypto Group. IBE Secure E-mail. http://crypto.stanford. edu/ibe/.
    • IBE Secure E-mail
  • 35
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP Through Secure Origin BGP
    • Sep
    • R. White. Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3):15-22, Sep 2003.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 15-22
    • White, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.