메뉴 건너뛰기




Volumn 4450 LNCS, Issue , 2007, Pages 298-314

Parallel key-insulated public key encryption without random oracles

Author keywords

Pairings; Parallel key insulated encryption; Standard model

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; RISK ANALYSIS;

EID: 38049047524     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71677-8_20     Document Type: Conference Paper
Times cited : (32)

References (38)
  • 2
    • 38049067401 scopus 로고    scopus 로고
    • Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption
    • Vietcrypt'06, to appear in
    • P.T.L. Anh, Y. Hanaoka, G. Hanaoka, K. Matsuura, H. Imai. Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. In Vietcrypt'06, to appear in LNCS series.
    • LNCS series
    • Anh, P.T.L.1    Hanaoka, Y.2    Hanaoka, G.3    Matsuura, K.4    Imai, H.5
  • 3
    • 79958074367 scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • Crypto'99, Springer
    • M. Bellare, S. Miner. A Forward-Secure Digital Signature Scheme. In Crypto'99, LNCS 1666, pp. 431-448. Springer, 1999.
    • (1666) LNCS , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 5
    • 35248832513 scopus 로고    scopus 로고
    • Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Cryptology ePrint Archive
    • Report 2002/064
    • M. Bellare, A. Palacio. Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Cryptology ePrint Archive: Report 2002/064, 2002.
    • (2002)
    • Bellare, M.1    Palacio, A.2
  • 6
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Eurocrypt'04, Springer
    • D. Boneh, X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, LNCS 3027, pp. 223-238. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 7
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • Eurocrypt'05, Springer
    • D. Boneh, X. Boyen, E.-J. Goh. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Eurocrypt'05, LNCS 3494, pp. 440-456. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Springer
    • D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, LNCS2139, pp. 213-229. Springer, 2001.
    • (2001) Crypto'01, LNCS2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Eurocrypt'03, of, Springer
    • D. Boneh, C. Gentry, B. Lynn, H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Eurocrypt'03, volume 2656 of LNCS, pages 416432. Springer, 2003.
    • (2003) LNCS , vol.2656 , pp. 416432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 10
    • 24144453101 scopus 로고    scopus 로고
    • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
    • CT-RSA '05, of, Springer
    • D. Boneh, J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. In CT-RSA '05, volume 3376 of LNCS, pages 87-103. Springer, 2005.
    • (2005) LNCS , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 11
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Asiacrypt'01, of, Springer
    • D. Boneh, B. Lynn, H. Shacham. Short signatures from the Weil pairing. In Asiacrypt'01, volume 2248 of LNCS, pages 514-532. Springer, 2002.
    • (2002) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 12
    • 33745767987 scopus 로고    scopus 로고
    • Direct Chosen Ciphertext Security from IdentityBased Techniques
    • ACM Press
    • X. Boyen, Q. Mei, B. Waters. Direct Chosen Ciphertext Security from IdentityBased Techniques, in ACM CCS'05, ACM Press, pages 320-329, 2005.
    • (2005) ACM CCS'05 , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 13
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, S. Halevi. The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 14
    • 35248897599 scopus 로고    scopus 로고
    • A forward secure public key encryption scheme
    • Eurocrypt'03, of, Springer
    • R. Canetti, S. Halevi, J. Katz. A forward secure public key encryption scheme. In Eurocrypt'03, volume 2656 of LNCS, pages 254-271. Springer, 2003.
    • (2003) LNCS , vol.2656 , pp. 254-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 15
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Eurocrypt'04, of, Springer
    • R. Canetti, S. Halevi, J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. In Eurocrypt'04, volume 3027 of LNCS, pages 207-222. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 35048843296 scopus 로고    scopus 로고
    • Secure Hierarchical Identity Based Signature and Its Application
    • ICICS'04, of, Springer
    • S. S. Chow, L. C. Kwong Hui, S. M. Yiu, K. P. Chow. Secure Hierarchical Identity Based Signature and Its Application. In ICICS'04, volume 3269 of LNCS, pages 480-494, Springer, 2004.
    • (2004) LNCS , vol.3269 , pp. 480-494
    • Chow, S.S.1    Kwong Hui, L.C.2    Yiu, S.M.3    Chow, K.P.4
  • 17
    • 0344232849 scopus 로고    scopus 로고
    • J. S. Coron, D. Naccache. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. In Asiacrypt'03, 2894 of LNCS, pages 392-397. Springer, 2003.
    • J. S. Coron, D. Naccache. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. In Asiacrypt'03, volume 2894 of LNCS, pages 392-397. Springer, 2003.
  • 18
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer, V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, in SIAM Journal of Computing 33, pages 167-226, 2003.
    • (2003) SIAM Journal of Computing , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 19
    • 35248884707 scopus 로고    scopus 로고
    • Intrusion-Resilient Public-Key Encryption
    • CT-RSA '03, of, Springer
    • Y. Dodis, M. Franklin, J. Katz, A. Miyaji, M. Yung. Intrusion-Resilient Public-Key Encryption. In CT-RSA '03, volume 2612 of LNCS, pages 19-32. Springer, 2003.
    • (2003) LNCS , vol.2612 , pp. 19-32
    • Dodis, Y.1    Franklin, M.2    Katz, J.3    Miyaji, A.4    Yung, M.5
  • 20
    • 84947254092 scopus 로고    scopus 로고
    • Key-Insulated Public Key Cryptosystems
    • Eurocrypt'02, of, Springer
    • Y. Dodis, J. Katz, S. Xu, M. Yung. Key-Insulated Public Key Cryptosystems. In Eurocrypt'02, volume 2332 of LNCS, pages 65-82. Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 21
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • PKC'03, of, Springer
    • Y. Dodis, J. Katz, S. Xu, M. Yung. Strong key-insulated signature schemes. In PKC'03, volume 2567 of LNCS, pages 130-144. Springer, 2003.
    • (2003) LNCS , vol.2567 , pp. 130-144
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 22
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security of Multiple Encryption
    • TCC'05, of, Springer
    • Y. Dodis, J. Katz. Chosen-Ciphertext Security of Multiple Encryption. In TCC'05, volume 3378 of LNCS, pages 188-209, Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 23
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • PKC'99, Springer
    • E. Fujisaki, T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In PKC'99, LNCS 1560, pp. 53-68. Springer, 1999.
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 24
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Asiacrypt'02, of, Springer
    • C. Gentry, A. Silverberg, Hierarchical ID-based cryptography. In Asiacrypt'02, volume 2501 of LNCS, pages 548-566. Springer, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 25
    • 33749564652 scopus 로고    scopus 로고
    • On Computing Products of Pairings. Cryptology ePrint Archive
    • Report 2006/172
    • R. Granger, N. P. Smart. On Computing Products of Pairings. Cryptology ePrint Archive: Report 2006/172, 2006.
    • (2006)
    • Granger, R.1    Smart, N.P.2
  • 26
    • 33745820265 scopus 로고    scopus 로고
    • Parallel Key-Insulated Public Key Encryption
    • PKC'06, of, Springer
    • G. Hanaoka, Y. Hanaoka, H. Imai. Parallel Key-Insulated Public Key Encryption. In PKC'06, volume 3958 of LNCS, pages 105-122, Springer, 2006.
    • (2006) LNCS , vol.3958 , pp. 105-122
    • Hanaoka, G.1    Hanaoka, Y.2    Imai, H.3
  • 27
    • 84937422774 scopus 로고    scopus 로고
    • SiBIR: Signer-Base Intrusion-Resilient Signatures
    • Crypto'02, of, Springer
    • G. Itkis, L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. In Crypto'02, volume 2442 of LNCS, pages 499-514, Springer, 2002.
    • (2002) LNCS , vol.2442 , pp. 499-514
    • Itkis, G.1    Reyzin, L.2
  • 28
    • 84946844750 scopus 로고    scopus 로고
    • Round Protocol for Tripartite Diffie-Hellman
    • ANTS'00, of, Springer
    • A. Joux. A One Round Protocol for Tripartite Diffie-Hellman. In ANTS'00, volume 1838 of LNCS, pages 385-394, Springer, 2000.
    • (2000) LNCS , vol.1838 , pp. 385-394
    • Joux, A.1    One, A.2
  • 29
    • 1642415603 scopus 로고    scopus 로고
    • A Forward-Secure Public-Key Encryption Scheme. Cryptology ePrint Archive
    • Report 2002/060
    • J. Katz. A Forward-Secure Public-Key Encryption Scheme. Cryptology ePrint Archive: Report 2002/060, 2002.
    • (2002)
    • Katz, J.1
  • 30
    • 33745826939 scopus 로고    scopus 로고
    • On the Limitations of the Spread of an IBE-to-PKE Transformation
    • PKC'06, Springer
    • E. Kiltz. On the Limitations of the Spread of an IBE-to-PKE Transformation. In PKC'06, LNCS 3958, pp. 274-289, Springer, 2006.
    • (2006) LNCS , vol.3958 , pp. 274-289
    • Kiltz, E.1
  • 31
    • 38049004199 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive
    • Report 2006/122
    • E. Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive: Report 2006/122, 2006.
    • (2006)
    • Kiltz, E.1
  • 32
    • 33746324862 scopus 로고    scopus 로고
    • Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
    • ACISP'06, of, Springer
    • E. Kiltz, D. Galindo. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In ACISP'06, volume 4058 of LNCS, pages 336-347 Springer, 2006.
    • (2006) LNCS , vol.4058 , pp. 336-347
    • Kiltz, E.1    Galindo, D.2
  • 33
    • 33746066354 scopus 로고    scopus 로고
    • Sequential Aggregate Signatures and Multisignatures Without Random Oracles
    • Eurocrypt'06, of, Springer
    • S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, B. Waters. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In Eurocrypt'06, volume 4004 of LNCS, pages 465-485, Springer, 2006.
    • (2006) LNCS , vol.4004 , pp. 465-485
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacham, H.4    Waters, B.5
  • 34
    • 33746372179 scopus 로고    scopus 로고
    • Efficient Identity-based Signatures Secure in the Standard Model
    • ACISP'06, of, Springer
    • K. G. Paterson, J. C. N. Schuldt. Efficient Identity-based Signatures Secure in the Standard Model. In ACISP'06, volume 4058 of LNCS, pages 207-222, Springer, 2006.
    • (2006) LNCS , vol.4058 , pp. 207-222
    • Paterson, K.G.1    Schuldt, J.C.N.2
  • 35
    • 84948976239 scopus 로고    scopus 로고
    • Using Hash Functions as a Hedge against Chosen Ciphertext Attack
    • Eurocrypt'00, of, Springer
    • V. Shoup. Using Hash Functions as a Hedge against Chosen Ciphertext Attack. In Eurocrypt'00, volume 1807 of LNCS, pages 275-288, Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 36
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Crypto'84, of, Springer
    • A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 196 of LNCS, pages 47-53. Springer, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 37
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Eurocrypt'05, of, Springer
    • B. Waters. Efficient Identity-Based Encryption Without Random Oracles. In Eurocrypt'05, volume 3494 of LNCS, pages 114-127. Springer 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 38
    • 14844297376 scopus 로고    scopus 로고
    • ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
    • ACM Press
    • D. Yao, N. Fazio, Y. Dodis, A. Lysyanskaya. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In ACM CCS'04, ACM Press, pages 354-363, 2004.
    • (2004) ACM CCS'04 , pp. 354-363
    • Yao, D.1    Fazio, N.2    Dodis, Y.3    Lysyanskaya, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.