메뉴 건너뛰기




Volumn , Issue , 2007, Pages 456-465

Provably secure ciphertext policy ABE

Author keywords

Access control; Attribute based encryption; Public key cryptography

Indexed keywords

ACCESS STRUCTURE; ATTRIBUTE-BASED ENCRYPTION; CIPHERTEXTS; DIFFIE HELLMAN; ENCRYPTION/DECRYPTION; IP MULTICAST; ONE-TIME SIGNATURE; PLAINTEXT; PROVABLY SECURE; SECRET KEY; SECURE DATABASE; SECURITY PROOFS; SHARED DATA; UNFORGEABILITY;

EID: 45749116552     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315302     Document Type: Conference Paper
Times cited : (749)

References (14)
  • 2
    • 33646870054 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • of LNCS, 2005
    • D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Crytology - CRYPTO 2005, volume 3621 of LNCS, 2005.
    • (2005) Advances in Crytology - CRYPTO , vol.3621
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 3
    • 33745855807 scopus 로고    scopus 로고
    • Strongly unforgeable signatures based on computational Diffie-Hellman
    • of LNCS, 2006
    • D. Boneh, E. Shen, and B. Waters. Strongly unforgeable signatures based on computational Diffie-Hellman. In Proceedings of PKC 2006, volume 3958 of LNCS, pages 229-240, 2006.
    • (2006) Proceedings of PKC , vol.3958 , pp. 229-240
    • Boneh, D.1    Shen, E.2    Waters, B.3
  • 4
    • 35048852705 scopus 로고    scopus 로고
    • Chosen ciphertext security from identity based encryption
    • of LNCS, 2004
    • R. Canetti, S. Halevi, and J. Katz. Chosen ciphertext security from identity based encryption. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222, 2004.
    • (2004) Advances in Cryptology - EUROCRYPT , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 6
    • 58049200643 scopus 로고    scopus 로고
    • Collusion-resistant group key management using attribute-based encryption
    • Presented at GOCP '07
    • L. Cheung, J. Cooley, R. Khazan, and C. Newport. Collusion-resistant group key management using attribute-based encryption. Cryptology ePrint Archive Report 2007/161, 2007. Presented at GOCP '07.
    • (2007) Cryptology EPrint Archive Report 2007/ , vol.161
    • Cheung, L.1    Cooley, J.2    Khazan, R.3    Newport, C.4
  • 9
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology - CRYTO '99, pages 537-554, 1999.
    • (1999) Advances in Cryptology - CRYTO '99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 84880852861 scopus 로고    scopus 로고
    • Recovation and tracing schemes for stateless receivers
    • of LNCS
    • D. Naor, M. Naor, and J. Lotspiech. Recovation and tracing schemes for stateless receivers. In Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 41-62, 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, pages 47-53, 1985.
    • (1985) Advances in Cryptology - CRYPTO '84 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.