메뉴 건너뛰기




Volumn 4450 LNCS, Issue , 2007, Pages 458-475

A closer look at PKI: Security and efficiency

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; STANDARDIZATION; USER INTERFACES;

EID: 38049077890     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71677-8_30     Document Type: Conference Paper
Times cited : (39)

References (44)
  • 1
    • 0003900676 scopus 로고    scopus 로고
    • Internet x.509 public key infrastructure: Certificate management protocols
    • Work in progress
    • C. Adams and S. Farrell. Internet x.509 public key infrastructure: Certificate management protocols. Work in progress, 2004.
    • (2004)
    • Adams, C.1    Farrell, S.2
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • ASIACRYPT, of, Springer-Verlag
    • S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In ASIACRYPT, volume 2894 of LNCS, pages 452-473. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.G.2
  • 3
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • Information Security ISC, of, Springer-Verlag
    • J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In Information Security (ISC), volume 3650 of LNCS, pages 134-148. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 80052994578 scopus 로고    scopus 로고
    • Multi-recipient encryption schemes: Security notions and randomness re-use
    • Springer-Verlag
    • M. Bellare, A. Boldyreva, and J. Staddon. Multi-recipient encryption schemes: Security notions and randomness re-use. In Public-Key Cryptography (PKC), volume 2567. Springer-Verlag, 2003.
    • (2003) Public-Key Cryptography (PKC) , vol.2567
    • Bellare, M.1    Boldyreva, A.2    Staddon, J.3
  • 7
    • 33645751082 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2005/058
    • K. Bentahar, P. Farshim, J. Malone-Lee, and N.P. Smart. Generic constructions of identity-based and certificateless kerns. Cryptology ePrint Archive, Report 2005/058., 2005.
    • (2005)
    • Bentahar, K.1    Farshim, P.2    Malone-Lee, J.3    Smart, N.P.4
  • 9
    • 35248880074 scopus 로고    scopus 로고
    • Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme
    • A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In Public Key Cryptography (PKC) '03, pages 31-46, 2003.
    • (2003) Public Key Cryptography (PKC) '03 , pp. 31-46
    • Boldyreva, A.1
  • 10
    • 38049077890 scopus 로고    scopus 로고
    • A closer look at PKI: Security and efficiency
    • paper. Available at
    • A. Boldyreva, M. Fischlin, A. Palacio, and B. Warinschi. A closer look at PKI: Security and efficiency. A full version of this paper. Available at http://www-static.cc.gatech.edu/~aboldyre/publications.html, 2007.
    • (2007) A full version of this
    • Boldyreva, A.1    Fischlin, M.2    Palacio, A.3    Warinschi, B.4
  • 11
    • 11244339991 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2003/096
    • A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signaure schemes for delegation of signing rights. Cryptology ePrint Archive, Report 2003/096., 2003.
    • (2003)
    • Boldyreva, A.1    Palacio, A.2    Warinschi, B.3
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO, of, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, volume 2139 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139
    • Boneh, D.1    Franklin, M.2
  • 15
    • 4944266340 scopus 로고    scopus 로고
    • Universally composable signature, certification, and authentication
    • IEEE Computer Society
    • R. Canetti. Universally composable signature, certification, and authentication. In CSFW. IEEE Computer Society, 2004.
    • (2004) CSFW
    • Canetti, R.1
  • 16
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshakes from CAoblivious encryption
    • ASIACRYPT, of, Springer-Verlag
    • C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from CAoblivious encryption. In ASIACRYPT, volume 3329 of LNCS, pages 293-307. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3329 , pp. 293-307
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 17
    • 33744808601 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2005/012
    • Z. Cheng and R. Comley. Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012., 2005.
    • (2005)
    • Cheng, Z.1    Comley, R.2
  • 18
    • 38049066662 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2005/348
    • A. W. Dent and C. Kudla. On proofs of security for certificateless cryptosystems. Cryptology ePrint Archive, Report 2005/348., 2005.
    • (2005)
    • Dent, A.W.1    Kudla, C.2
  • 19
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, Vol. 31, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31
    • ElGamal, T.1
  • 20
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • CRYPTO, of
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO, volume 1666 of LNCS, pages 537-554, 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 21
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • EUROCRYPT, of, Springer-Verlag
    • C. Gentry. Certificate-based encryption and the certificate revocation problem. In EUROCRYPT, volume 2656 of LNCS, pages 272-293. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 23
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 24
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Springer-Verlag
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In CRYPTO, volume 2729. Springer-Verlag, 2003.
    • (2003) CRYPTO , vol.2729
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 25
    • 33746370456 scopus 로고    scopus 로고
    • Key replacement attack against a generic construction of certificateless signature
    • Springer-Verlag
    • B. Hu, D. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In ACISP, volume 4058 of LNCS, pages 235-246. Springer-Verlag, 2006.
    • (2006) ACISP, volume 4058 of LNCS , pp. 235-246
    • Hu, B.1    Wong, D.2    Zhang, Z.3    Deng, X.4
  • 28
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • Springer-Verlag
    • S. Kim, S. Park, and D. Won. Proxy signatures, revisited. In ICICS. Springer-Verlag, 1997.
    • (1997) ICICS
    • Kim, S.1    Park, S.2    Won, D.3
  • 29
    • 84974698157 scopus 로고    scopus 로고
    • Self-certified signatures
    • Indocrypt, of, Springer-Verlag
    • B. Lee and K. Kim. Self-certified signatures. In Indocrypt, volume 2551 of LNCS. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2551
    • Lee, B.1    Kim, K.2
  • 30
    • 33749383760 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2004/150
    • Y.-R. Lee and H.-S. Lee. An authenticated certificateless public key encryption scheme. Cryptology ePrint Archive, Report 2004/150., 2004.
    • (2004)
    • Lee, Y.-R.1    Lee, H.-S.2
  • 31
    • 33745833916 scopus 로고    scopus 로고
    • On Constructing Certificateless Cryptosystems from Identity Based Encryption
    • Public Key Cryptography PKC, Springer-Verlag
    • B. Libert and J.-J. Quisquater. On Constructing Certificateless Cryptosystems from Identity Based Encryption. In Public Key Cryptography (PKC), LNCS. Springer-Verlag, 2006.
    • (2006) LNCS
    • Libert, B.1    Quisquater, J.-J.2
  • 33
    • 84947294004 scopus 로고    scopus 로고
    • Modeling public-key infrastructure
    • Springer-Verlag
    • U. Maurer. Modeling public-key infrastructure. In Computer Security - ESORICS 96, pages 325-350. Springer-Verlag, 1996.
    • (1996) Computer Security - ESORICS 96 , pp. 325-350
    • Maurer, U.1
  • 35
    • 3843066626 scopus 로고    scopus 로고
    • Security of signature schemes in a multi-user setting
    • A. Menezes and N. Smart. Security of signature schemes in a multi-user setting. Designs, Codes and Cryptography, 33:261-274, 2004.
    • (2004) Designs, Codes and Cryptography , vol.33 , pp. 261-274
    • Menezes, A.1    Smart, N.2
  • 38
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 39
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO. Springer-Verlag, 1984.
    • (1984) CRYPTO
    • Shamir, A.1
  • 40
    • 38049036156 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2005/287
    • Y. Shi and J. Li. Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287., 2005.
    • (2005)
    • Shi, Y.1    Li, J.2
  • 41
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • 3120
    • V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, 1999.
    • (1999) IBM Research Report RZ
    • Shoup, V.1
  • 42
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • EuroPKI, of, Springer-Verlag
    • D. H. Yum and P. J. Lee. Generic construction of certificateless encryption. In EuroPKI, volume 3043 of LNCS, pages 802-811. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3043 , pp. 802-811
    • Yum, D.H.1    Lee, P.J.2
  • 43
    • 35048832495 scopus 로고    scopus 로고
    • Generic construction of certificateless signature
    • Springer-Verlag
    • D. H. Yum and P. J. Lee. Generic construction of certificateless signature. In ACISP, volume 3108 of LNCS, pages 200-211. Springer-Verlag, 2004.
    • (2004) ACISP, volume 3108 of LNCS , pp. 200-211
    • Yum, D.H.1    Lee, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.