메뉴 건너뛰기




Volumn , Issue , 2007, Pages 19-26

A brief look at pairings based cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC GEOMETRY; ASYMPTOTIC NOTATION; CRYPTOSYSTEMS; EFFICIENT ALGORITHMS; LONG STANDING; NEW GENERATION; OPEN PROBLEMS; POLYNOMIAL-TIME; PUBLIC-KEY CRYPTOGRAPHY;

EID: 46749157920     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2007.4389476     Document Type: Conference Paper
Times cited : (15)

References (56)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John MaloneLee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In CRYPTO, pages 205-222, 2005.
    • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John MaloneLee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In CRYPTO, pages 205-222, 2005.
  • 2
    • 24944516264 scopus 로고    scopus 로고
    • Tag-kem/dem: A new framework for hybrid encryption and new analysis of kurosawa-desmedt kern
    • Proceedings of Eurocrypt '05, Springer
    • M. Abe, R. Gennaro, K. Kurosawa, and V. Shoup. Tag-kem/dem: A new framework for hybrid encryption and new analysis of kurosawa-desmedt kern. In Proceedings of Eurocrypt '05, LNCS. Springer, 2005.
    • (2005) LNCS
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 4
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Extended abstract in NDSS '05
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM TISSEC, 9(1), 2006. Extended abstract in NDSS '05.
    • (2006) ACM TISSEC , vol.9 , Issue.1
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 5
    • 46749145666 scopus 로고    scopus 로고
    • Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive
    • Report 2005/385
    • Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005/385, 2005.
    • (2005)
    • Ateniese, G.1    Camenisch, J.2
  • 10
    • 35248880074 scopus 로고    scopus 로고
    • Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme
    • Proceedings of PKC 2003, of, Springer-Verlag
    • Alexandra Boldyreva. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In Proceedings of PKC 2003, volume 2567 of LNCS, pages 31-46. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2567 , pp. 31-46
    • Boldyreva, A.1
  • 11
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selectiveID identity based encryption without random oracles
    • Proceedings of Eurocrypt 2004, of, Springer
    • D. Boneh and Xavier Boyen. Efficient selectiveID identity based encryption without random oracles. In Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 223-38. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 12
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Proceedings of Crypto 2004, August
    • D. Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Proceedings of Crypto 2004, LNCS, August 2004.
    • (2004) LNCS
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 14
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • extended abstract in Crypto '01
    • D. Boneh and Matt Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. extended abstract in Crypto '01.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 15
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryption without pairings
    • D. Boneh, C. Gentry, and M. Hamburg. Space-efficient identity based encryption without pairings. In FOCS '07, 2007.
    • (2007) FOCS '07
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 16
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of Eurocrypt '03, pages 416-423, 2003.
    • (2003) Proceedings of Eurocrypt '03 , pp. 416-423
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 17
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO '05, pages 258-275, 2005.
    • (2005) CRYPTO '05 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 18
    • 33645998247 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • D. Boneh, E. Goh, and X. Boyen. Hierarchical identity based encryption with constant size ciphertext. In proceedings of Eurocrypt '05, 2005.
    • (2005) proceedings of Eurocrypt '05
    • Boneh, D.1    Goh, E.2    Boyen, X.3
  • 19
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • Proceedings of Theory of Cryptography Conference 2005, of, Springer
    • D. Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-dnf formulas on ciphertexts. In Proceedings of Theory of Cryptography Conference 2005, volume 3378 of LNCS, pages 325-342. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 325-342
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 20
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Extended abstract in Asiacrypt 2001
    • D. Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. J. of Cryptology, 17(4):297-319, 2004. Extended abstract in Asiacrypt 2001.
    • (2004) J. of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 21
    • 33746096270 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • D. Boneh, Amit Sahai, and Brent Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In Proceedings of Eurocrypt '06, 2006.
    • (2006) Proceedings of Eurocrypt '06
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 22
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • X. Boyen, Q. Mei, and B. Waters. Direct chosen ciphertext security from identity-based techniques. In proceedings of ACM CCS'05, pages 320-329, 2005.
    • (2005) proceedings of ACM CCS'05 , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 23
    • 33751053984 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • Xavier Boyen and Brent Waters. Anonymous hierarchical identity-based encryption (without random oracles). In Crypto '06, 2006.
    • (2006) Crypto '06
    • Boyen, X.1    Waters, B.2
  • 24
  • 25
    • 24944577209 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In proceedings of Crypto '04, 2004.
    • (2004) proceedings of Crypto '04
    • Camenisch, J.1    Lysyanskaya, A.2
  • 26
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Proceedings of Eurocrypt 2003, of
    • Ran Canetti, Shai Halevi, and Jonathan Katz. A forward-secure public-key encryption scheme. In Proceedings of Eurocrypt 2003, volume 2656 of LNCS, 2003.
    • (2003) LNCS , vol.2656
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 27
    • 35048852705 scopus 로고    scopus 로고
    • Chosenciphertext security from identity-based encryption
    • Proceedings of Eurocrypt 2004
    • Ran Canetti, Shai Halevi, and Jonathan Katz. Chosenciphertext security from identity-based encryption. In Proceedings of Eurocrypt 2004, LNCS, 2004.
    • (2004) LNCS
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 29
    • 85024261619 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • Extended abstract in Proc. 6th ACM CCS, 1999
    • Ronald Cramer and Victor Shoup. Signature schemes based on the strong RSA assumption. ACM TISSEC, 3(3): 161-185, 2000. Extended abstract in Proc. 6th ACM CCS, 1999.
    • (2000) ACM TISSEC , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 30
    • 46749093677 scopus 로고    scopus 로고
    • Searchable public-key encryption based on jacobi symbols
    • manuscript, Feb
    • Giovanni Di Crescenzo and Vishal Saraswat. Searchable public-key encryption based on jacobi symbols, manuscript, Feb. 2007.
    • (2007)
    • Di Crescenzo, G.1    Saraswat, V.2
  • 31
    • 33745140375 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Yevgeniy Dodis and Aleksandr Yampolskiy. A verifiable random function with short proofs and keys. In Proceedings of PKC'05, 2005.
    • (2005) Proceedings of PKC'05
    • Dodis, Y.1    Yampolskiy, A.2
  • 32
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Proceedings of Crypto '93, of, Springer-Verlag
    • A. Fiat and M. Naor. Broadcast encryption. In Proceedings of Crypto '93, volume 773 of LNCS, pages 480-491. Springer-Verlag, 1993.
    • (1993) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 33
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • Proceedings of Eurocrypt 1999, Springer-Verlag
    • Rosario Gennaro, Shai Halevi, and Tal Rabin. Secure hash-and-sign signatures without the random oracle. In Proceedings of Eurocrypt 1999, LNCS, pages 123-139. Springer-Verlag, 1999.
    • (1999) LNCS , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 34
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Proceedings of Eurocrypt '06, of
    • Craig Gentry. Practical identity-based encryption without random oracles. In Proceedings of Eurocrypt '06, volume 4004 of LNCS, pages 445-464, 2006.
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 36
    • 46749101284 scopus 로고    scopus 로고
    • Jens Groth, Rafail Ostrovsky, and Amit Sahai. Noninteractive zaps and new techniques for NIZK. In Proceedings of Crypto '06, 2006.
    • Jens Groth, Rafail Ostrovsky, and Amit Sahai. Noninteractive zaps and new techniques for NIZK. In Proceedings of Crypto '06, 2006.
  • 38
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • extended abstract in ANTS 2000
    • Antoine Joux. A one round protocol for tripartite Diffie-Hellman. J. of Cryptology, 17(4):263-276, 2004. extended abstract in ANTS 2000.
    • (2004) J. of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 39
    • 21144454271 scopus 로고    scopus 로고
    • Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
    • extended abstract in ePrint report 2001/003
    • Antoine Joux and Kim Nguyen. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. J. of Cryptology, 16(4):239-247, 2003. extended abstract in ePrint report 2001/003.
    • (2003) J. of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 41
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-ciphertext security from tag-based encryption
    • Eike Kiltz. Chosen-ciphertext security from tag-based encryption. In Proceedings of TCC'06, pages 581-600, 2006.
    • (2006) Proceedings of TCC'06 , pp. 581-600
    • Kiltz, E.1
  • 42
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Eyal Kushilevitz and Rafail Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS '97, pages 364-373, 1997.
    • (1997) FOCS '97 , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 43
    • 18744387712 scopus 로고    scopus 로고
    • Oblivious signature-based envelope
    • selected paper from PODC '03
    • Ninghui Li, Wenliang Du, and D. Boneh. Oblivious signature-based envelope. Distributed Computing, 17(4):293-302, 2005. selected paper from PODC '03.
    • (2005) Distributed Computing , vol.17 , Issue.4 , pp. 293-302
    • Li, N.1    Du, W.2    Boneh, D.3
  • 46
    • 84937425161 scopus 로고    scopus 로고
    • Unique signatures and verifiable random functions from DH-DDH separation
    • A. Lysyanskaya. Unique signatures and verifiable random functions from DH-DDH separation. In Proceedings of Crypto '02, pages 597-612, 2002.
    • (2002) Proceedings of Crypto '02 , pp. 597-612
    • Lysyanskaya, A.1
  • 47
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • U. Maurer. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In Proceedings of Crypto'94, pages 271-281, 1994.
    • (1994) Proceedings of Crypto'94 , pp. 271-281
    • Maurer, U.1
  • 50
    • 22144445920 scopus 로고
    • The weil pairing, and its efficient calculation
    • 235-261, extended abstract written in, but never published
    • Victor Miller. The weil pairing, and its efficient calculation. J. of Cryptology, 17(4):235-261, 2004. extended abstract written in 1986, but never published.
    • (1986) J. of Cryptology , vol.17 , Issue.4
    • Miller, V.1
  • 51
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Proceedings of Crypto '01, of
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto '01, volume 2139 of LNCS, pages 41-62, 2001.
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 54
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology-CRYPTO 1984, of, Springer-Verlag
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-CRYPTO 1984, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 55
    • 0003357475 scopus 로고
    • The Arithmetic of Elliptic Curves
    • of, Springer-Verlag
    • Joseph H. Silverman. The Arithmetic of Elliptic Curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, 1986.
    • (1986) Graduate Texts in Mathematics , vol.106
    • Silverman, J.H.1
  • 56
    • 24944590176 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer
    • Brent Waters. Efficient identity-based encryption without random oracles. In Proceedings of Eurocrypt 2005. Springer, 2005.
    • (2005) Proceedings of Eurocrypt 2005
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.