메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 230-244

HEAD: Hybrid encryption with delegated decryption capability

Author keywords

Delegated decryption; DHIES; Public key encryption

Indexed keywords

ARTIFICIAL INTELLIGENCE; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048854690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_19     Document Type: Article
Times cited : (5)

References (13)
  • 1
    • 35048896142 scopus 로고    scopus 로고
    • http://www.i2r.a-star.edu.sg/icsd/staff/guilin/bible/proxy.htm.
  • 2
    • 84937579774 scopus 로고    scopus 로고
    • DHIES: An encryption scheme based on the Diffie-Hellman problem
    • Lecture Notes in Computer Science, Springer-Verlag
    • M. Abdalla, M. Bellare and P. Rogaway. DHIES : An encryption scheme based on the Diffie-Hellman problem, Proceedings of CT-RSA 2001, Lecture Notes in Computer Science, Springer-Verlag, pages 143-158.
    • Proceedings of CT-RSA 2001 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 35048844366 scopus 로고    scopus 로고
    • ANSI X9.63 Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Transport Schemes
    • American National Standards Institute (ANSI) X9.F1 sub-committee. ANSI X9.63 Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Transport Schemes, 1998. Working draft version 2.0.
    • (1998) Working Draft Version 2.0
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Proceedings of CRYPTO 2001, Lecture Notes in Computer Science, volume 2139, Springer-Verlag, pages 213-229.
    • Proceedings of CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh, G. Di. Crescenzo, R. Ostrovsky and G. Persiano. Public Key Encryption with Keyword Search. Proceedings of EUROCRYPT 2004, Lecture Notes in Computer Science, Springer-Verlag, pp 506-522.
    • Proceedings of EUROCRYPT 2004 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.Di.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Lecture Notes in Computer Science, Springer-Verlag
    • P. S. L. M. Barreto, H. Y. Kim and M. Scott. Efficient algorithms for pairing-based cryptosystems. Proceedings of Crypto 2002, Lecture Notes in Computer Science, volume 2442, Springer-Verlag, pages 354-368.
    • Proceedings of Crypto 2002 , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Scott, M.3
  • 8
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • Lecture Notes in Computer Science, Springer-Verlag
    • S. Halevi and P. Rogaway. A tweakable enciphering mode. Proceedings of Crypto 2003, Lecture Notes in Computer Science, volume 2729, Springer-Verlag, pages 482-499.
    • Proceedings of Crypto 2003 , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 9
    • 35048894821 scopus 로고    scopus 로고
    • A parallelizable enciphering mode
    • Lecture Notes in Computer Science, Springer-Verlag
    • S. Halevi and P. Rogaway. A parallelizable enciphering mode. Proceedings of CT-RSA 8004, Lecture Notes in Computer Science, Springer-Verlag, pages 292-304.
    • Proceedings of CT-RSA 8004 , pp. 292-304
    • Halevi, S.1    Rogaway, P.2
  • 10
    • 26444437239 scopus 로고    scopus 로고
    • How to remove MAC from DHIES
    • Lecture Notes in Computer Science, Springer-Verlag
    • K. Kurosawa and T. Matsuo. How to remove MAC from DHIES. Proceedings of ACISP, 2004, Lecture Notes in Computer Science, Springer-Verlag, pp 236-247.
    • Proceedings of ACISP, 2004 , pp. 236-247
    • Kurosawa, K.1    Matsuo, T.2
  • 13
    • 35048854587 scopus 로고    scopus 로고
    • An Efficient Signature Scheme from Bilinear Pairings and Its Applications
    • Lecture Notes in Computer Science, Springer-Verlag
    • F. Zhang, R. Safavi-Naini and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Proceedings of Public Key Cryptography 2004, Lecture Notes in Computer Science, volume 2947 , pp. 277-290. Springer-Verlag, 2004.
    • (2004) Proceedings of Public Key Cryptography 2004 , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.