메뉴 건너뛰기




Volumn 4521 LNCS, Issue , 2007, Pages 288-306

Identity-based proxy re-encryption

Author keywords

Bilinear maps; Identity based encryption; Proxy re encryption

Indexed keywords

DATA PRIVACY; MATHEMATICAL MODELS; NETWORK SECURITY; PROBLEM SOLVING; RANDOM PROCESSES; SECURITY SYSTEMS;

EID: 38049061546     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72738-5_19     Document Type: Conference Paper
Times cited : (551)

References (24)
  • 1
    • 0030687206 scopus 로고    scopus 로고
    • Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans
    • Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1 (1997) 54-63
    • (1997) Fund. Electronics Communications and Computer Science , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of Eurocrypt '98. Volume 1403. (1998) 127-144
    • (1998) Proceedings of Eurocrypt '98 , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Proceedings of Public Key Cryptography. (1999) 112-121
    • (1999) Proceedings of Public Key Cryptography , pp. 112-121
    • Jakobsson, M.1
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Advances in Cryptology (CRYPTO 2001). 2139 of Lecture Notes in Computer Science., Springer (2001) 213-229
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Advances in Cryptology (CRYPTO 2001). Volume 2139 of Lecture Notes in Computer Science., Springer (2001) 213-229
  • 7
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on Quadratic Residues
    • Cryptography and Coding, 8th IMA International Conference. of, Springer
    • Cocks, C.: An identity based encryption scheme based on Quadratic Residues. In: Cryptography and Coding, 8th IMA International Conference. Volume 2260 of Lecture Notes in Computer Science., Springer (2001) 360-363
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 9
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Advances in Cryptology, EUROCRYPT, of
    • Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT 2004. Volume 3027 of Lecture Notes in Computer Science. (2004) 506-522
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 11
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from Identity Based Encryption
    • Proceedings of Eurocrypt '04. of, Springer-Verlag
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from Identity Based Encryption. In: Proceedings of Eurocrypt '04. Volume 3027 of Lecture Notes in Computer Science., Springer-Verlag (2004) 207-222
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 12
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil Pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. SIAM Journal of Computing 32(3) (2003) 586-615
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 13
    • 38049047470 scopus 로고    scopus 로고
    • Voltage Security, Inc
    • Voltage Security, Inc. (http://www.voltage.com)
  • 14
    • 12344290414 scopus 로고    scopus 로고
    • Distributed blinding for ElGamal re-encryption
    • Technical Report 2004-1924, Cornell Computer Science Department
    • Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed blinding for ElGamal re-encryption. Technical Report 2004-1924, Cornell Computer Science Department (2004)
    • (2004)
    • Zhou, L.1    Marsh, M.A.2    Schneider, F.B.3    Redz, A.4
  • 16
    • 38049003435 scopus 로고    scopus 로고
    • Boneh, D., Goh, E.J., Matsuo, T.: Proposal for P1363.3 Proxy Re-encryption, (http://grouper.ieee.org/groups/1363/IBC/submissions/ NTTDataProposal-for-P1363.3-2006-09-01.pdf)
    • Boneh, D., Goh, E.J., Matsuo, T.: Proposal for P1363.3 Proxy Re-encryption, (http://grouper.ieee.org/groups/1363/IBC/submissions/ NTTDataProposal-for-P1363.3-2006-09-01.pdf)
  • 17
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure Identity-Based Encryption without random oracles
    • Proceedings of Eurocrypt '04. of, Springer
    • Boneh, D., Boyen, X.: Efficient selective-id secure Identity-Based Encryption without random oracles. In: Proceedings of Eurocrypt '04. Volume 3027 of Lecture Notes in Computer Science., Springer (2004) 223-238
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 18
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Proceedings of Eurocrypt '05. of, Springer
    • Waters, B.: Efficient Identity-Based Encryption without random oracles. In: Proceedings of Eurocrypt '05. Volume 3494 of Lecture Notes in Computer Science., Springer (2005) 114-127
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 20
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Proceedings of Crypto '99. 1666 of, Springer
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Proceedings of Crypto '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 537-554
    • (1999) Lecture Notes in Computer Science , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 21
    • 33745678280 scopus 로고    scopus 로고
    • Applying Fujisaki-Okamoto to Identity-Based Encryption
    • Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium AAECC-16, of, Springer
    • Yang, P., Kitagawa, T., Hanaoka, G., Zhang, R., Matsuura, K., Imai, H.: Applying Fujisaki-Okamoto to Identity-Based Encryption. In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium (AAECC-16). Volume 3857 of Lecture Notes in Computer Science., Springer (2006) 183-192
    • (2006) Lecture Notes in Computer Science , vol.3857 , pp. 183-192
    • Yang, P.1    Kitagawa, T.2    Hanaoka, G.3    Zhang, R.4    Matsuura, K.5    Imai, H.6
  • 22
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based cryptography
    • Proceedings of Asiacrypt '02. of, Springer
    • Gentry, C., Silverberg, A.: Hierarchical ID-Based cryptography. In: Proceedings of Asiacrypt '02. Volume 2501 of Lecture Notes in Computer Science., Springer (2002) 548-566
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 23
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil Pairing
    • ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. of, London, UK, Springer-Verlag
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil Pairing. In: ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Volume 2248 of Lecture Notes in Computer Science., London, UK, Springer-Verlag (2001) 514-532
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 24
    • 38049053962 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption. Cryptology ePrint Archive
    • Report 2006/473
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. Cryptology ePrint Archive, Report 2006/473 (2006) http://eprint.iacr.org/2006/473.pdf.
    • (2006)
    • Green, M.1    Ateniese, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.