메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 265-282

Blind identity-based encryption and simulatable oblivious transfer

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTATIONAL EFFICIENCY; LEARNING SYSTEMS; NETWORK PROTOCOLS; USER INTERFACES;

EID: 38149091799     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_16     Document Type: Conference Paper
Times cited : (110)

References (46)
  • 1
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 2
    • 35248880074 scopus 로고    scopus 로고
    • Boldyreva, A.: Threshold, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 31-46. Springer, Heidelberg (2003)
    • Boldyreva, A.: Threshold, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31-46. Springer, Heidelberg (2003)
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure Identity-Based Encryption without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure Identity-Based Encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 382-400. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 382-400
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil Pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 7
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryption without pairings
    • to appear
    • Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryption without pairings. In: FOCS (to appear, 2007)
    • (2007) FOCS
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 8
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 9
    • 33749573228 scopus 로고    scopus 로고
    • Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles. In: Dwork, C (ed.) CRYPTO 2006. LNCS, 4117, pp. 290-307. Springer, Heidelberg (2006)
    • Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles. In: Dwork, C (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006)
  • 10
    • 84888252697 scopus 로고
    • All-or-nothing disclosure of secrets
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Brassard, G., Crépeau, C., Robert, J.-M.: All-or-nothing disclosure of secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234-238. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 234-238
    • Brassard, G.1    Crépeau, C.2    Robert, J.-M.3
  • 11
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number n is the product of two safe primes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Camenisch, J., Michels, M.: Proving in zero-knowledge that a number n is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 12
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • EUROCRYPT, Springer, Heidelberg
    • Camenisch, J., Neven, G., shelat, A.: Simulatable adaptive oblivious transfer. In: EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    shelat, A.3
  • 13
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 15
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from Identity Based Encryption
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from Identity Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 84957661460 scopus 로고    scopus 로고
    • Easy come - easy go divisible cash
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Chan, A., Frankel, Y., Tsiounis, Y.: Easy come - easy go divisible cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 561-575. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 561-575
    • Chan, A.1    Frankel, Y.2    Tsiounis, Y.3
  • 17
    • 33745840439 scopus 로고    scopus 로고
    • Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model
    • Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 424-140. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 424-140
    • Chatterjee, S.1    Sarkar, P.2
  • 18
    • 77649262307 scopus 로고    scopus 로고
    • HIBE with Short Public Parameters without Random Oracle
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: HIBE with Short Public Parameters without Random Oracle. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 145-160. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 145-160
    • Chatterjee, S.1    Sarkar, P.2
  • 19
    • 85181648378 scopus 로고    scopus 로고
    • Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-203. Plenum Press (1982)
    • Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-203. Plenum Press (1982)
  • 21
    • 33746042561 scopus 로고    scopus 로고
    • Security analysis of the strong Diffie-Hellman problem
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Cheon, J.H.: Security analysis of the strong Diffie-Hellman problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1-11. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 1-11
    • Cheon, J.H.1
  • 22
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on Quadratic Residues
    • Honary, B, ed, Cryptography and Coding, Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 23
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 24
    • 35048840744 scopus 로고    scopus 로고
    • Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-round oblivious transfer in the bounded storage model. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 446-472. Springer, Heidelberg (2004)
    • Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-round oblivious transfer in the bounded storage model. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 446-472. Springer, Heidelberg (2004)
  • 25
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO 1982, pp. 205-210 (1982)
    • (1982) CRYPTO 1982 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 26
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 27
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 29
    • 38049125096 scopus 로고    scopus 로고
    • Reducing trust in the PKG in identity based cryptosystems
    • CRYPTO, Springer, Heidelberg
    • Goyal, V.: Reducing trust in the PKG in identity based cryptosystems. In: CRYPTO 2007. LNCS, vol. 4622, pp. 430-447. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 430-447
    • Goyal, V.1
  • 30
    • 38149058578 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer. Cryptology ePrint Archive
    • Report 2007/235
    • Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. Cryptology ePrint Archive, Report 2007/235 (2007)
    • (2007)
    • Green, M.1    Hohenberger, S.2
  • 31
    • 24944473997 scopus 로고    scopus 로고
    • Smooth projective hashing and two-message oblivious transfer
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 78-95
    • Kalai, Y.T.1
  • 32
    • 84898989941 scopus 로고    scopus 로고
    • Kiliate;n, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
    • Kiliate;n, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31 (1988)
  • 33
    • 84958045705 scopus 로고    scopus 로고
    • A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem
    • Hirschfeld, R, ed, FC, Springer, Heidelberg
    • Miyazaki, S., Sakurai, K.: A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 296-308. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1465 , pp. 296-308
    • Miyazaki, S.1    Sakurai, K.2
  • 34
    • 33749549619 scopus 로고    scopus 로고
    • Secure and practical identity-based encryption. Cryptology ePrint Archive
    • Report 2005/369
    • Naccache, D.: Secure and practical identity-based encryption. Cryptology ePrint Archive, Report 2005/369 (2005), http://eprint.iacr.org/
    • (2005)
    • Naccache, D.1
  • 35
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC 1999, pp. 245-254 (1999)
    • (1999) STOC 1999 , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 36
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573-590. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 38
    • 1942420748 scopus 로고    scopus 로고
    • Ogata, W., Kurosawa, K.: Oblivious keyword search. Special issue on coding and cryptography Journal of Complexity 20(2-3), 356-371 (2004)
    • Ogata, W., Kurosawa, K.: Oblivious keyword search. Special issue on coding and cryptography Journal of Complexity 20(2-3), 356-371 (2004)
  • 39
    • 33745554010 scopus 로고    scopus 로고
    • Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 80-99. Springer, Heidelberg (2006)
    • Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
  • 40
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 41
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Aiken Computation Laboratory, Harvard University
    • Rabin, M.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981)
    • (1981)
    • Rabin, M.1
  • 42
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • Schnorr, C.-P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.-P.1
  • 43
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 44
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 46
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.