메뉴 건너뛰기




Volumn 21, Issue 1, 2008, Pages 97-130

Tag-KEM/DEM: A new framework for hybrid encryption

Author keywords

Hybrid encryption; Key encapsulation; Tag KEM; Threshold encryption

Indexed keywords

HYBRID ENCRYPTION; KEY ENCAPSULATION; THRESHOLD ENCRYPTION;

EID: 39149130011     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-007-9010-x     Document Type: Article
Times cited : (72)

References (38)
  • 1
    • 84957069963 scopus 로고    scopus 로고
    • Robust distributed multiplication without interaction
    • Lecture Notes in Computer Science Springer Berlin
    • M. Abe, Robust distributed multiplication without interaction, in Advances in Cryptology-CRYPTO'99, ed. by M. Wiener. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, 1999), pp. 130-147
    • (1999) Advances in Cryptology-CRYPTO'99 , vol.1666 , pp. 130-147
    • Abe, M.1    Wiener, M.2
  • 3
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
    • Lecture Notes in Computer Science Springer Berlin. Also available at IACR e-print 2005/027 and 2004/194
    • M. Abe, R. Gennaro, K. Kurosawa, V. Shoup, Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM, in Advances in Cryptology-EUROCRYPT 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer, Berlin, 2005), pp. 128-146. Also available at IACR e-print 2005/027 and 2004/194
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4    Cramer, R.5
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Association for Computing Machinery
    • M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in First ACM Conference on Computer and Communication Security (Association for Computing Machinery, 1993), pp. 62-73
    • (1993) First ACM Conference on Computer and Communication Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 78650941074 scopus 로고    scopus 로고
    • Simplified OAEP for the RSA and Rabin functions
    • Lecture Notes in Computer Science Springer Berlin
    • D. Boneh, Simplified OAEP for the RSA and Rabin functions, in Advances in Cryptology-CRYPTO 2001, ed. by J. Killian. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 275-291
    • (2001) Advances in Cryptology-CRYPTO 2001 , vol.2139 , pp. 275-291
    • Boneh, D.1    Killian, J.2
  • 9
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption
    • Lecture Notes in Computer Science Springer Berlin
    • D. Boneh, X. Boyen, Efficient selective-ID secure identity based encryption, in Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 223-238
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 11
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • ACM Also available at IACR e-print 2005/288
    • X. Boyen, Q. Mei, B. Waters, Direct chosen ciphertext security from identity-based techniques, in ACM Conference on Computer and Communications Security (ACM, 2005), pp. 320-329. Also available at IACR e-print 2005/288
    • (2005) ACM Conference on Computer and Communications Security , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 12
    • 33745655389 scopus 로고    scopus 로고
    • Chosen ciphertext secure public key threshold encryption without random oracles
    • Lecture Notes in Computer Science Springer Berlin
    • D. Boneh, X. Boyen, S. Halevi, Chosen ciphertext secure public key threshold encryption without random oracles, in Topics in Cryptology-CT-RSA 2006, ed. by T. Rabin, S. Halevi. Lecture Notes in Computer Science, vol. 3860 (Springer, Berlin, 2006), pp. 226-243
    • (2006) Topics in Cryptology-CT-RSA 2006 , vol.3860 , pp. 226-243
    • Boneh, D.1    Boyen, X.2    Halevi, S.3    Rabin, T.4    Halevi, S.5
  • 13
    • 84957712291 scopus 로고    scopus 로고
    • An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
    • Lecture Notes in Computer Science Springer Berlin
    • R. Canetti, S. Goldwasser, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack, in Advances in Cryptology-EUROCRYPT'99, ed. by J. Stern. Lecture Notes in Computer Science, vol. 1592 (Springer, Berlin, 1999), pp. 90-106
    • (1999) Advances in Cryptology-EUROCRYPT'99 , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2    Stern, J.3
  • 14
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • Lecture Notes in Computer Science Springer Berlin. Also available at IACR ePrint archive 2003/174
    • R. Canetti, H. Krawczyk, J. Nielsen, Relaxing chosen-ciphertext security, in Advances in Cryptology-CRYPTO 2003, ed. by D. Boneh. Lecture Notes in Computer Science, vol. 2729 (Springer, Berlin, 2003), pp. 565-582. Also available at IACR ePrint archive 2003/174
    • (2003) Advances in Cryptology-CRYPTO 2003 , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.3    Boneh, D.4
  • 15
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Lecture Notes in Computer Science Springer Berlin
    • R. Canetti, S. Halevi, J. Katz, Chosen-ciphertext security from identity-based encryption, in Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 207-222
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Lecture Notes in Computer Science Springer Berlin
    • R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in Advances in Cryptology-CRYPTO'98, ed. by H. Krawczyk. Lecture Notes in Computer Science, vol. 1462 (Springer, Berlin, 1998), pp. 13-25
    • (1998) Advances in Cryptology-CRYPTO'98 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2    Krawczyk, H.3
  • 17
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Lecture Notes in Computer Science Springer Berlin
    • R. Cramer, V. Shoup, Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, in Advances in Cryptology-EUROCRYPTO 2002, ed. by L. Knudsen. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 45-64
    • (2002) Advances in Cryptology-EUROCRYPTO 2002 , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2    Knudsen, L.3
  • 18
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • 1
    • R. Cramer, V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2003)
    • (2003) SIAM J. Comput. , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 19
    • 33646842805 scopus 로고    scopus 로고
    • A designer's guide to KEMs
    • Lecture Notes in Computer Science Springer Berlin
    • A. Dent, A designer's guide to KEMs, in 9th IMA International Conference on Cryptography and Coding, ed. by K.G. Paterson. Lecture Notes in Computer Science, vol. 2898 (Springer, Berlin, 2003), pp. 133-151
    • (2003) 9th IMA International Conference on Cryptography and Coding , vol.2898 , pp. 133-151
    • Dent, A.1    Paterson, K.G.2
  • 20
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Lecture Notes in Computer Science Springer Berlin
    • Y.G. Desmedt, Y. Frankel, Threshold cryptosystems, in Advances in Cryptology-CRYPTO'89, ed. by G. Brassard. Lecture Notes in Computer Science, vol. 435 (Springer, Berlin, 1990), pp. 307-315
    • (1990) Advances in Cryptology-CRYPTO'89 , vol.435 , pp. 307-315
    • Desmedt, Y.G.1    Frankel, Y.2    Brassard, G.3
  • 21
  • 22
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Lecture Notes in Computer Science Springer Berlin
    • E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology-CRYPTO'99, ed. by M. Wiener. Lecture Notes in Computer Science, vol. 1666 (Springer, Berlin, 1999), pp. 537-554
    • (1999) Advances in Cryptology-CRYPTO'99 , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2    Wiener, M.3
  • 27
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures (extended abstract)
    • Lecture Notes in Computer Science Springer Berlin
    • S. Jarecki, A. Lysyanskaya, Adaptively secure threshold cryptography: introducing concurrency, removing erasures (extended abstract), in Advances in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807 (Springer, Berlin, 2000), pp. 221-242
    • (2000) Advances in Cryptology-EUROCRYPT 2000 , vol.1807 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 28
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-ciphertext security from tag-based encryption
    • Lecture Notes in Computer Science Springer Berlin
    • E. Kiltz, Chosen-ciphertext security from tag-based encryption, in Theory of Cryptography-TCC'06, ed. by S. Halevi, T. Rabin. Lecture Notes in Computer Science, vol. 3876 (Springer, Berlin, 2006), pp. 581-600
    • (2006) Theory of Cryptography-TCC'06 , vol.3876 , pp. 581-600
    • Kiltz, E.1    Halevi, S.2    Rabin, T.3
  • 29
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • Lecture Notes in Computer Science Springer Berlin
    • K. Kurosawa, Y. Desmedt, A new paradigm of hybrid encryption scheme, in Advances in Cryptology-CRYPTO 2004, ed. by M. Franklin. Lecture Notes in Computer Science, vol. 3152 (Springer, Berlin, 2004), pp. 426-442
    • (2004) Advances in Cryptology-CRYPTO 2004 , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2    Franklin, M.3
  • 30
    • 30744458170 scopus 로고    scopus 로고
    • Alternatives to non-malleability: Definitions, constructions, and applications
    • Lecture Notes in Computer Science Springer Berlin
    • P. MacKenzie, M.K. Reiter, K. Yang, Alternatives to non-malleability: definitions, constructions, and applications, in Theory of Cryptography-TCC'04, ed. by M. Naor. Lecture Notes in Computer Science, vol. 2951 (Springer, Berlin, 2004), pp. 171-190
    • (2004) Theory of Cryptography-TCC'04 , vol.2951 , pp. 171-190
    • MacKenzie, P.1    Reiter, M.K.2    Yang, K.3    Naor, M.4
  • 31
    • 24144473586 scopus 로고    scopus 로고
    • A universally composable secure channel based on the KEM-DEM framework
    • Lecture Notes in Computer Science Springer Berlin
    • W. Nagao, Y. Manabe, T. Okamoto, A universally composable secure channel based on the KEM-DEM framework, in Theory of Cryptography-TCC'05. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 426-444
    • (2005) Theory of Cryptography-TCC'05 , vol.3378 , pp. 426-444
    • Nagao, W.1    Manabe, Y.2    Okamoto, T.3
  • 33
    • 14844330007 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • Lecture Notes in Computer Science Springer Berlin
    • T. Okamoto, D. Pointcheval, REACT: Rapid enhanced-security asymmetric cryptosystem transform, in RSA'2001. Lecture Notes in Computer Science (Springer, Berlin, 2001)
    • (2001) RSA'2001
    • Okamoto, T.1    Pointcheval, D.2
  • 34
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Lecture Notes in Computer Science Springer Berlin
    • C. Rackoff, D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, in Advances in Cryptology-CRYPTO'91. Lecture Notes in Computer Science, vol. 576 (Springer, Berlin, 1992), pp. 433-444
    • (1992) Advances in Cryptology-CRYPTO'91 , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 35
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • Lecture Notes in Computer Science Springer Berlin
    • V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, in Advances in Cryptology-EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807 (Springer, Berlin, 2000), pp. 275-288
    • (2000) Advances in Cryptology-EUROCRYPT 2000 , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 36
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Lecture Notes in Computer Science Springer Berlin
    • V. Shoup, OAEP reconsidered, in Advances in Cryptology-CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 239-259
    • (2001) Advances in Cryptology-CRYPTO 2001 , vol.2139 , pp. 239-259
    • Shoup, V.1
  • 38
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • 2
    • V. Shoup, R. Gennaro, Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptol. 15(2), 75-96 (2002)
    • (2002) J. Cryptol. , vol.15 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.