메뉴 건너뛰기




Volumn 4887 LNCS, Issue , 2007, Pages 384-402

Multi-key hierarchical identity-based signatures

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 38149048400     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77272-9_23     Document Type: Conference Paper
Times cited : (11)

References (33)
  • 1
    • 38149002625 scopus 로고    scopus 로고
    • Adida, B., Chau, D., Hohenberger, S., Rivest, R.L.: Lightweight signatures for email. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, Springer, Heidelberg (2006)
    • Adida, B., Chau, D., Hohenberger, S., Rivest, R.L.: Lightweight signatures for email. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, Springer, Heidelberg (2006)
  • 3
    • 26444464784 scopus 로고    scopus 로고
    • Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 72-87. Springer, Heidelberg (2005)
    • Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 72-87. Springer, Heidelberg (2005)
  • 4
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from Bilinear maps
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.: Efficient and provably-secure identity-based signatures and signcryption from Bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.4
  • 5
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268-286. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 6
    • 85025838724 scopus 로고    scopus 로고
    • Bellare, M., Neven, G.: Identity-based multi-signatures from RSA. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 145-162. Springer, Heidelberg (2006)
    • Bellare, M., Neven, G.: Identity-based multi-signatures from RSA. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 145-162. Springer, Heidelberg (2006)
  • 7
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 10
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • Dwork, C ed, CRYPTO 2006, Springer, Heidelberg
    • Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 12
    • 35248844436 scopus 로고    scopus 로고
    • Cha, J.C., Cheon, J.H.: An identity-based signature from Gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
    • Cha, J.C., Cheon, J.H.: An identity-based signature from Gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
  • 13
    • 38149011817 scopus 로고    scopus 로고
    • Role Signatures for Access Control in Grid Computing. Royal Holloway, University of London
    • Technical Report RHUL-MA-2007-2, May
    • Crampton, J., Lim, H.W.: Role Signatures for Access Control in Grid Computing. Royal Holloway, University of London, Technical Report RHUL-MA-2007-2, (May 2007)
    • (2007)
    • Crampton, J.1    Lim, H.W.2
  • 16
    • 38049084297 scopus 로고    scopus 로고
    • Pairings for Cryptographers. Cryptology ePrint Archive
    • Report 2006/165 May
    • Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers. Cryptology ePrint Archive, Report 2006/165 (May 2006), http://eprint.iacr.org/2006/165
    • (2006)
    • Galbraith, S.D.1    Paterson, K.G.2    Smart, N.P.3
  • 17
    • 77649247458 scopus 로고    scopus 로고
    • On the generic construction of identity-based signatures with additional properties
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 178-193. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 178-193
    • Galindo, D.1    Herranz, J.2    Kiltz, E.3
  • 18
    • 33745849655 scopus 로고    scopus 로고
    • Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 257-273. Springer, Heidelberg (2006)
    • Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257-273. Springer, Heidelberg (2006)
  • 19
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 20
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Wright, R.N, di Vimercati, S.D.C, Shmatikov, V, eds, ACM Press, New York
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Wright, R.N., di Vimercati, S.D.C., Shmatikov, V. (eds.) CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference, pp. 89-98. ACM Press, New York (2006)
    • (2006) CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 21
    • 35248867510 scopus 로고    scopus 로고
    • Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, 2593, pp. 310-324. Springer, Heidelberg (2003)
    • Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2593, pp. 310-324. Springer, Heidelberg (2003)
  • 22
    • 84947242701 scopus 로고    scopus 로고
    • Towards hierarchical identity-based encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Towards hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 23
    • 84946844750 scopus 로고    scopus 로고
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS-IV. LNCS, 1838, pp. 385-394. Springer, Heidelberg (2000)
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS-IV. LNCS, vol. 1838, pp. 385-394. Springer, Heidelberg (2000)
  • 25
    • 33746066354 scopus 로고    scopus 로고
    • Sequential aggregate signatures and multisignatures without random oracles
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465-485. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 465-485
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacham, H.4    Waters, B.5
  • 26
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Electronics Letters 38(18), 1025-1026 (2002)
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 27
    • 33746372179 scopus 로고    scopus 로고
    • Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 207-222. Springer, Heidelberg (2006)
    • Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 207-222. Springer, Heidelberg (2006)
  • 29
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 32
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 33
    • 35248891001 scopus 로고    scopus 로고
    • Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 111-121. Springer, Heidelberg (2003)
    • Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111-121. Springer, Heidelberg (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.