메뉴 건너뛰기




Volumn , Issue , 2008, Pages 334-341

A certificateless signature and group signature schemes against malicious PKG

Author keywords

[No Author keywords available]

Indexed keywords

ALUMINUM; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 50249109606     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2008.84     Document Type: Conference Paper
Times cited : (12)

References (25)
  • 1
    • 85020598353 scopus 로고
    • Identity Based Cryptosystems and Signature Schemes
    • Advances in Cryptology-CRYPTO, of, Spinger
    • A. Shamir. Identity Based Cryptosystems and Signature Schemes. In Advances in Cryptology-CRYPTO, volume 196 of LNCS, pages 37-53. Spinger. 1984.
    • (1984) LNCS , vol.196 , pp. 37-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • D. Boneh, F. Franklin.Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto'2001, Lncs 2139, pages 213-229. Springer-Verlag, 2001.
    • D. Boneh, F. Franklin.Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto'2001, Lncs 2139, pages 213-229. Springer-Verlag, 2001.
  • 3
    • 33646820668 scopus 로고    scopus 로고
    • Paulo S.L.M. Barreto, Benoit Libert, Noel McCullagh and Jaen-Jacques Quisquater. Efficient and provably-secure identity-based signature and signcryption from bilinear maps. In Bimal Roy, editor, ASIACRYPT. 3788 of Lecture Notes in Computer Science, pages 515-532. Springer, 2005.
    • Paulo S.L.M. Barreto, Benoit Libert, Noel McCullagh and Jaen-Jacques Quisquater. Efficient and provably-secure identity-based signature and signcryption from bilinear maps. In Bimal Roy, editor, ASIACRYPT. volume 3788 of Lecture Notes in Computer Science, pages 515-532. Springer, 2005.
  • 4
    • 50249136163 scopus 로고    scopus 로고
    • Byoungcheon Lee, Colin Boyd. Ed Dawson, Kwangji Kim, Jeongmo Yang and Seungjae Yoo. Secure key issuing in idbased cryptography. In James M. Hogan, Paul Montague, Martin K. Purvis and Chris Steketee, editors. ACSW frontiers, 32 of CRPIT. pages 69-74. Australian Computer Society, 2004.
    • Byoungcheon Lee, Colin Boyd. Ed Dawson, Kwangji Kim, Jeongmo Yang and Seungjae Yoo. Secure key issuing in idbased cryptography. In James M. Hogan, Paul Montague, Martin K. Purvis and Chris Steketee, editors. ACSW frontiers, volume 32 of CRPIT. pages 69-74. Australian Computer Society, 2004.
  • 5
    • 38049125096 scopus 로고    scopus 로고
    • Reducing Trust in the PKG in Identity Based Cryptosystems
    • Advances in Cryptology, CRYPTO, of, Springer
    • Vipul Goyal. Reducing Trust in the PKG in Identity Based Cryptosystems. In Advances in Cryptology - CRYPTO 2007, volume 4450 of Lecture Notes in Computer Science, pages 430-447. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4450 , pp. 430-447
    • Goyal, V.1
  • 6
    • 84944050090 scopus 로고    scopus 로고
    • Chen, L., Harrison, K.. Smart, N. P. and Solera, D., Applications of multiple trust authorities in pairing based cryptosystems', InfraSec 2002, Lncs 2437, Springer-Verlag, pp.260-275.
    • Chen, L., Harrison, K.. Smart, N. P. and Solera, D., Applications of multiple trust authorities in pairing based cryptosystems', InfraSec 2002, Lncs 2437, Springer-Verlag, pp.260-275.
  • 7
    • 35248866223 scopus 로고    scopus 로고
    • Craig Gentry. Certificate-based encryption and the certificate revocation problem. In Eli Biham, editor, EUROCRYPT 2003, 2656 of Lecture Notes in Computer Science, pages 272-293. Springer, 2003.
    • Craig Gentry. Certificate-based encryption and the certificate revocation problem. In Eli Biham, editor, EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 272-293. Springer, 2003.
  • 8
    • 0345490607 scopus 로고    scopus 로고
    • Sattam S. Al-Riyami and Kenneth G. Paterson. Certificate-less public key cryptography. In Chi-Sung Laih. editor. ASI-ACRYPT. 2894 of Lecture Notes in Computer Science, pages 452-473. Springer. 2003.
    • Sattam S. Al-Riyami and Kenneth G. Paterson. Certificate-less public key cryptography. In Chi-Sung Laih. editor. ASI-ACRYPT. volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer. 2003.
  • 9
    • 85024290278 scopus 로고    scopus 로고
    • David Chaum and Eugène van heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 1991, 547 of Lecture Notes in Computer Science, pages 257-65. Springer-Verlag, 1991.
    • David Chaum and Eugène van heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 1991, volume 547 of Lecture Notes in Computer Science, pages 257-65. Springer-Verlag, 1991.
  • 10
    • 33746042155 scopus 로고    scopus 로고
    • Compact group signatures without random oracles
    • Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
    • Xavier Boyen and Brent Waters. Compact group signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 427-444. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4004 , pp. 427-444
    • Boyen, X.1    Waters, B.2
  • 12
    • 46749145666 scopus 로고    scopus 로고
    • Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracle. Cryptology eprint Archive
    • Report 2005/385
    • Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracle. Cryptology eprint Archive, Report 2005/385, 2005. http://eprint.iacr.org/.
    • (2005)
    • Ateniese, G.1    Camenisch, J.2
  • 13
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
    • Brent Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 427-444. Springer-Verlag. 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 427-444
    • Waters, B.1
  • 14
    • 33746372179 scopus 로고    scopus 로고
    • Kenneth G. Paterson and Jacob C.N. Schuldt. Efficient identity-based signature secure in the standard model. ACISP 2006. 4058 of Lecture Notes in Computer Science, pages 207-222. Springer, 2006.
    • Kenneth G. Paterson and Jacob C.N. Schuldt. Efficient identity-based signature secure in the standard model. ACISP 2006. volume 4058 of Lecture Notes in Computer Science, pages 207-222. Springer, 2006.
  • 15
    • 50249167827 scopus 로고    scopus 로고
    • C. Castelluccia. How to convert any ID-based signature scheme into a group signature scheme. Cryptology ePrint Archive, Report 2002.
    • C. Castelluccia. How to convert any ID-based signature scheme into a group signature scheme. Cryptology ePrint Archive, Report 2002.
  • 16
    • 35048832495 scopus 로고    scopus 로고
    • D. H. Yum and P. J. Lee. Generic construction of certificate-less signature. In Information Security and Privacy: 9th Australian Conference. ACISP 2004, 3108 of Lecture Notes in computer Science, pages 200-211. Spinger-Verlag, 2004.
    • D. H. Yum and P. J. Lee. Generic construction of certificate-less signature. In Information Security and Privacy: 9th Australian Conference. ACISP 2004, volume 3108 of Lecture Notes in computer Science, pages 200-211. Spinger-Verlag, 2004.
  • 18
    • 33745833916 scopus 로고    scopus 로고
    • On constructing certificateless cryptosystems from identity based encryption
    • 9th International Conference on Theory and Practice in Public Key Cryptography, PKC2006, of, Springer- Verlag
    • B. Libert and J.-J. Quisquater. On constructing certificateless cryptosystems from identity based encryption. In 9th International Conference on Theory and Practice in Public Key Cryptography, PKC2006, volume 3958 of Lecture Notes in Computer Science, pages 474-490. Springer- Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3958 , pp. 474-490
    • Libert, B.1    Quisquater, J.-J.2
  • 19
    • 33746370456 scopus 로고    scopus 로고
    • B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In Information Security and Privacy: 11th Australian Conference. ACISP 2006, 3108 of Lecture Notes in computer Science, pages 235-246. Spinger-Verlag, 2006.
    • B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In Information Security and Privacy: 11th Australian Conference. ACISP 2006, volume 3108 of Lecture Notes in computer Science, pages 235-246. Spinger-Verlag, 2006.
  • 20
    • 84876300178 scopus 로고    scopus 로고
    • Malicious KGC attacks in certificateless cryptosystems
    • To appear in, also at
    • M. H. Au, J. Chen, J. K. Liu. Y. M. D. S. Wong, and G. Yang. Malicious KGC attacks in certificateless cryptosystems. To appear in ACM ASIACCS 2007, also at http://eprint.iacr.org/2006/255.
    • (2007) ACM ASIACCS
    • Au, M.H.1    Chen, J.2    Liu, J.K.3    Wong, Y.M.D.S.4    Yang, G.5
  • 21
    • 84937570422 scopus 로고    scopus 로고
    • M. Girault. Self-Certified public keys. In Proc. EUROCRYPT91. LNCS 547.pages 490-497, Springer-Verlag, 1992.
    • M. Girault. Self-Certified public keys. In Proc. EUROCRYPT91. LNCS 547.pages 490-497, Springer-Verlag, 1992.
  • 22
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
    • Mihir Bellare, Daniele Micciancio, and Bogdan Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology-EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-29. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 23
    • 33645958856 scopus 로고    scopus 로고
    • J.Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC 05, pages 134-148. Springer-Verlag, 2005. Lecture Notes in Computer Science 3650.
    • J.Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC 05, pages 134-148. Springer-Verlag, 2005. Lecture Notes in Computer Science Vol. 3650.
  • 24
    • 84876341103 scopus 로고    scopus 로고
    • Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model
    • To appear in
    • J. K. Liu. M. H. Au, Willy Susilo. Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model. To appear in ACM ASIACCS 2007.
    • (2007) ACM ASIACCS
    • Liu, J.K.1    Au, M.H.2    Susilo, W.3
  • 25
    • 84876300178 scopus 로고    scopus 로고
    • Malicious KGC attacks in certificateless cryptosystems
    • To appear in, also at
    • M. H. Au, J. Chen, J. K. Liu, Y. M. D. S. Wong, and G. Yang. Malicious KGC attacks in certificateless cryptosystems. To appear in ACM ASIACCS 2007, also at http:// eprint.iacr.org/2006/255.
    • (2007) ACM ASIACCS
    • Au, M.H.1    Chen, J.2    Liu, J.K.3    Wong, Y.M.D.S.4    Yang, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.