메뉴 건너뛰기




Volumn 4784 LNCS, Issue , 2007, Pages 51-67

Construction of a hybrid HIBE protocol secure against adaptive attacks (without random Oracle)

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SYSTEMS; COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; NETWORK PROTOCOLS; PROBLEM SOLVING; QUEUEING NETWORKS;

EID: 38149113936     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (31)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer [16], pp. 128-146
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer [16], pp. 128-146
  • 2
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for PairingBased Cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for PairingBased Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 3
    • 38149115625 scopus 로고    scopus 로고
    • Identity based key encapsulation with wildcards. In: Cryptology ePrint Archive
    • Report 2006/377
    • Birkett, J., Dent, A.W., Neven, G., Schuldt, J.: Identity based key encapsulation with wildcards. In: Cryptology ePrint Archive, Report 2006/377 (2006), http://eprint.iacr.org/
    • (2006)
    • Birkett, J.1    Dent, A.W.2    Neven, G.3    Schuldt, J.4
  • 4
    • 14844324877 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin and Camenisch [10], pp. 223-238
    • Cachin and Camenisch , vol.10 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 6
    • 38149120998 scopus 로고    scopus 로고
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer [16], pp. 440-456, Full version available at Cryptology ePrint Archive; Report 2005/015
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer [16], pp. 440-456, Full version available at Cryptology ePrint Archive; Report 2005/015
  • 7
    • 33745854208 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. of Computing 36(5), 915-942 (2006)
    • (2006) SIAM J. of Computing , vol.36 , Issue.5 , pp. 915-942
    • Boneh, D.1    Canetti, R.2    Halevi, S.3    Katz, J.4
  • 9
    • 33745767987 scopus 로고    scopus 로고
    • Direct Chosen Ciphertext Security from Identity-Based Techniques
    • Atluri, V, Meadows, C, Juels, A, eds, ACM Press, New York
    • Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 320-329. ACM Press, New York (2005)
    • (2005) ACM Conference on Computer and Communications Security , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 10
    • 38149043682 scopus 로고    scopus 로고
    • EUROCRYPT 2004
    • Cachin, C, Camenisch, J, eds, Springer, Heidelberg
    • Cachin, C., Camenisch, J. (eds.): EUROCRYPT 2004. LNCS, vol. 3027, pp. 2-6. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 2-6
  • 11
    • 34547476660 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin and Camenisch [10], pp. 207-222.
    • Cachin and Camenisch , vol.10 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 12
    • 33845925071 scopus 로고    scopus 로고
    • A General Construction of Tweakable Block Ciphers and Different Modes of Operations
    • Lipmaa, H, Yung, M, Lin, D, eds, Inscrypt 2006, Springer, Heidelberg
    • Chakraborty, D., Sarkar, P.: A General Construction of Tweakable Block Ciphers and Different Modes of Operations. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 88-102. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4318 , pp. 88-102
    • Chakraborty, D.1    Sarkar, P.2
  • 13
    • 33745840439 scopus 로고    scopus 로고
    • Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
    • Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 424-440. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 424-440
    • Chatterjee, S.1    Sarkar, P.2
  • 14
    • 77649262307 scopus 로고    scopus 로고
    • HIBE with Short Public Parameters Without Random Oracle
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: HIBE with Short Public Parameters Without Random Oracle. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 145-160. Springer, Heidelberg (2006), http://eprint.iacr.org/
    • (2006) LNCS , vol.4284 , pp. 145-160
    • Chatterjee, S.1    Sarkar, P.2
  • 15
    • 34547456130 scopus 로고    scopus 로고
    • New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
    • Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 310-327. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4296 , pp. 310-327
    • Chatterjee, S.1    Sarkar, P.2
  • 16
    • 38049111724 scopus 로고    scopus 로고
    • EUROCRYPT 2005
    • Cramer, R, ed, Springer, Heidelberg
    • Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494
  • 17
    • 38149013275 scopus 로고    scopus 로고
    • CRYPTO 2004
    • Franklin, M, ed, Springer, Heidelberg
    • Franklin, M. (ed.): CRYPTO 2004. LNCS, vol. 3152, pp. 15-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 15-19
  • 18
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate Pairing
    • Fieker, C, Kohel, D.R, eds, Algorithmic Number Theory, Springer, Heidelberg
    • Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate Pairing. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory. LNCS, vol. 2369, pp. 324-337. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.D.1    Harrison, K.2    Soldera, D.3
  • 19
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 20
    • 84958968987 scopus 로고    scopus 로고
    • Gligor, V.D., Donescu, P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui, M. (ed.) FSE 2001. LNCS, 2355, pp. 92-108. Springer, Heidelberg (2002)
    • Gligor, V.D., Donescu, P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002)
  • 21
    • 84947242701 scopus 로고    scopus 로고
    • Toward Hierarchical Identity-Based Encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 22
    • 84945137421 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529-544. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 529-544
    • Jutla, C.S.1
  • 23
    • 38049004199 scopus 로고    scopus 로고
    • Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts. In: Cryptology ePrint Archive
    • Report 2006/122
    • Kiltz, E.: Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts. In: Cryptology ePrint Archive, Report 2006/122 (2006), http://eprint.iacr.org/
    • (2006)
    • Kiltz, E.1
  • 24
    • 33746324862 scopus 로고    scopus 로고
    • Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 336-347. Springer, Heidelberg (2006), full version available at http://eprint.iacr.org/2006/034
    • Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 336-347. Springer, Heidelberg (2006), full version available at http://eprint.iacr.org/2006/034
  • 26
    • 33749549619 scopus 로고    scopus 로고
    • Secure and Practical Identity-Based Encryption. Cryptology ePrint Archive
    • Report 2005/369
    • Naccache, D.: Secure and Practical Identity-Based Encryption. Cryptology ePrint Archive, Report 2005/369 (2005) http://eprint.iacr.org/
    • (2005)
    • Naccache, D.1
  • 27
    • 33644958567 scopus 로고    scopus 로고
    • Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, 3329, pp. 16-31. Springer, Heidelberg (2004)
    • Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16-31. Springer, Heidelberg (2004)
  • 28
    • 38149093531 scopus 로고    scopus 로고
    • Construction of a hybrid hierarchical identity based encryption protocol secure against adaptive attacks (without random oracle). Cryptology ePrint Archive
    • Report 2006/362
    • Sarkar, P., Chatterjee, S.: Construction of a hybrid hierarchical identity based encryption protocol secure against adaptive attacks (without random oracle). Cryptology ePrint Archive, Report 2006/362 (2006), http://eprint.iacr.org/
    • (2006)
    • Sarkar, P.1    Chatterjee, S.2
  • 29
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 30
    • 38149002469 scopus 로고    scopus 로고
    • Shoup, V, A proposal for an ISO standard for public key encryption version 2.1, December 20, 2001, available from
    • Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1), (December 20, 2001), available from http://www.shoup.net/papers/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.