메뉴 건너뛰기




Volumn 4859 LNCS, Issue , 2007, Pages 297-311

A certificate-based proxy cryptosystem with revocable proxy decryption power

Author keywords

Certificate based encryption (CBE); Pairing; Proxy cryptosystem

Indexed keywords

INFORMATION ANALYSIS; MATHEMATICAL MODELS; RANDOM PROCESSES;

EID: 38349068669     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77026-8_22     Document Type: Conference Paper
Times cited : (27)

References (14)
  • 1
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 6
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
    • Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 7
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
    • Mambo, M., Okamoto, E.: Proxy cryptosystem: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals E80-A(1), 54-63 (1997)
    • (1997) IEICE Trans. Fundamentals , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 8
    • 84860368738 scopus 로고    scopus 로고
    • Delegation decryption
    • Walker, M, ed, IMA, Crypto & Coding, Springer, Heidelberg
    • Mu, Y., Varadharajan, V., Nguyen, K.Q.: Delegation decryption. In: Walker, M. (ed.) IMA - Crypto & Coding 1999. LNCS, vol. 1746, pp. 258-269. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1746 , pp. 258-269
    • Mu, Y.1    Varadharajan, V.2    Nguyen, K.Q.3
  • 9
    • 38349015975 scopus 로고    scopus 로고
    • Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS2000-C20 (2000)
    • Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS2000-C20 (2000)
  • 10
    • 35048854690 scopus 로고    scopus 로고
    • HEAD: Hybrid encryption with delegated decryption capbility
    • Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
    • Sarkar, P.: HEAD: hybrid encryption with delegated decryption capbility. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 230-244. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3348 , pp. 230-244
    • Sarkar, P.1
  • 12
    • 38349010221 scopus 로고    scopus 로고
    • Authorization-limited transformation-free proxy cryptosystems and their security analyses
    • Wang, L., Cao, Z., Okamoto, T., Miao, Y., Okamoto, E.: Authorization-limited transformation-free proxy cryptosystems and their security analyses. IEICE Trans. Fundamentals E89-A(1), 106-114 (2006)
    • (2006) IEICE Trans. Fundamentals , vol.E89-A , Issue.1 , pp. 106-114
    • Wang, L.1    Cao, Z.2    Okamoto, T.3    Miao, Y.4    Okamoto, E.5
  • 13
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 14
    • 33744930359 scopus 로고    scopus 로고
    • Zhou, Y., Cao, Z., Chai, Z.: Constructing secure proxy cryptosystem. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 150-161. Springer, Heidelberg (2005)
    • Zhou, Y., Cao, Z., Chai, Z.: Constructing secure proxy cryptosystem. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 150-161. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.