메뉴 건너뛰기




Volumn 1, Issue 3, 2005, Pages 173-182

Using Threshold Attribute-Based Encryption for Practical Biometric-Based Access Control

Author keywords

Access control; Biometric based encryption; Fuzzy identity based encryption

Indexed keywords

ATTRIBUTE-BASED ENCRYPTIONS; CIPHERTEXTS; IDENTITY BASED ENCRYPTION; ITS EFFICIENCIES; RANDOM ORACLE MODEL;

EID: 34547269639     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (23)
  • 10
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer-Verlag
    • E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," LNCS 1666, pp. 537-554, Springer-Verlag, 1999.
    • (1999) LNCS 1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 12
    • 0037743010 scopus 로고    scopus 로고
    • Software implementation of finite fields of characteristic three, for use in pairing based cryptosystem
    • K. Harrison, D. Page, and N. P. Smart, "Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems," London Mathematical Society Journal of Computing Math-emetics, vol. 5, pp. 181-193, 2002.
    • (2002) London Mathematical Society Journal of Computing Math-emetics , vol.5 , pp. 181-193
    • Harrison, K.1    Page, D.2    Smart, N.P.3
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryp-tosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryp-tosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and sig-nature schemes
    • Springer-Verlag, New York, Inc
    • A. Shamir, "Identity-based cryptosystems and sig-nature schemes," in Proceedings of CRYPTO'84 on Advances in Cryptology, pp. 47-53. Springer-Verlag, New York, Inc., 1984.
    • (1984) Proceedings of CRYPTO'84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.