메뉴 건너뛰기




Volumn 7, Issue 5, 2008, Pages 349-377

A survey of certificateless encryption schemes and security models

Author keywords

Certificateles sencryption; Certificateless cryptography; Cryptography; Public key cryptography

Indexed keywords

CRYPTOGRAPHY; SURVEYS;

EID: 53449097686     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-008-0055-0     Document Type: Article
Times cited : (110)

References (34)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption
    • In: Cramer, R. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Abe, M., Gennaro, R., Karosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption. In: Cramer, R. (ed.) Advance in Cryptology - Eurocrypt 2005. Lecture Notes in Computer Science, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
    • (2005) Advance in Cryptology - Eurocrypt 2005 , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Karosawa, K.3    Shoup, V.4
  • 3
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • In: Laih, C.S. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology-Asiacrypt 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
    • (2003) Advances in Cryptology-Asiacrypt 2003 , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 4
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CL-PKE: A generic construction and efficient schemes
    • In: Vaudenay, S. (ed.) Lecture Notes in Computer Science Springer, Heiedelberg
    • Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) Public Key Cryptography-PKC 2005. Lecture Notes in Computer Science, vol. 3386, pp. 398-415. Springer, Heiedelberg (2005)
    • (2005) Public Key Cryptography-PKC 2005 , vol.3386 , pp. 398-415
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 7
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • In: Zhou, J., Lopez, J. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J. (eds.) Proceedings of the 8th International Conference on Information Security (ISC 2005). Lecture Notes in Computer Science, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
    • (2005) Proceedings of the 8th International Conference on Information Security (ISC 2005) , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 9
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • In: Vaudenay, S. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Advances in Cryptology-Eurocrypt 2006. Lecture Notes in Computer Science, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) Advances in Cryptology-Eurocrypt 2006 , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 38049077890 scopus 로고    scopus 로고
    • A closer look at PKI: Security and efficiency
    • In: Okamoto, T., Wang, X. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: Security and efficiency. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography-PKC 2007. Lecture Notes in Computer Science, vol. 4450, pp. 458-475. Springer, Heidelberg (2007)
    • (2007) Public Key Cryptography-PKC 2007 , vol.4450 , pp. 458-475
    • Boldyreva, A.1    Fischlin, M.2    Palacio, A.3    Warinschi, B.4
  • 12
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • In: Menezes, A., (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A., (ed.) Topics in Cryptology-CT-RSA 2005. Lecture Notes in Computer Science, vol. 3376, pp. 87-103. Springer, Heidelberg (2005)
    • (2005) Topics in Cryptology-CT-RSA 2005 , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 15
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer R., Shoup V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput 33 (1), 167-226 (2004)
    • (2004) SIAM J Comput , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 16
    • 40249097044 scopus 로고    scopus 로고
    • Certificateless encryption schemes strongly secure in the standard model
    • (Unpublished Manuscript)
    • Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly secure in the standard model (2007, Unpublished Manuscript)
    • (2007)
    • Dent, A.W.1    Libert, B.2    Paterson, K.G.3
  • 18
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-ciphertext security of multiple encryption
    • In: Kilian, J. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian, J. (ed.) Theory of Cryptography-TCC 2005. Lecture Notes in Computer Science, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
    • (2005) Theory of Cryptography-TCC 2005 , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 19
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimal cost
    • In: Imai, H., Zheng, Y. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimal cost. In: Imai, H., Zheng, Y. (eds.) Public Key Cryptography, Lecture Notes in Computer Science, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
    • (1999) Public Key Cryptography , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 20
    • 33746215222 scopus 로고    scopus 로고
    • Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes
    • In: Atzeni, A.S., Lioy, A. (eds.) 2006) Lecture Notes in Computer Science Springer, Heidelberg
    • Galindo, D., Morillo, P., Ráfols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) Public Key Infrastructure: 3rd European PKI Workshop (EuroPKI 2006). Lecture Notes in Computer Science, vol. 4043, pp. 81-91. Springer, Heidelberg (2006)
    • (2006) Public Key Infrastructure: 3rd European PKI Workshop (EuroPKI , vol.4043 , pp. 81-91
    • Galindo, D.1    Morillo, P.2    Ráfols, C.3
  • 21
    • 38149074788 scopus 로고    scopus 로고
    • Generic certificateless encryption in the standard model
    • In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Advances in Information and Computer Security (IWSEC 2007). Lecture Notes in Computer Science, vol. 4752, pp. 278-291. Springer, Heidelberg (2007)
    • (2007) Advances in Information and Computer Security (IWSEC 2007) , vol.4752 , pp. 278-291
    • Huang, Q.1    Wong, D.S.2
  • 22
    • 38149126356 scopus 로고    scopus 로고
    • Generic certificateless key encapsulation mechanism
    • In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Huang, Q., Wong, D.S.: Generic certificateless key encapsulation mechanism. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Information Security and Privacy (ACISP 2007). Lecture Notes in Computer Science, vol. 4586, pp. 215-299. Springer, Heidelberg (2007)
    • (2007) Information Security and Privacy (ACISP 2007) , vol.4586 , pp. 215-299
    • Huang, Q.1    Wong, D.S.2
  • 23
    • 38049007949 scopus 로고    scopus 로고
    • Self-generated-certificate public key encryption without pairing
    • In: Okamoto, T., Wang, X. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Lai, J., Kou, K.: Self-generated-certificate public key encryption without pairing. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography-PKC 2007, Lecture Notes in Computer Science, vol. 4450, pp. 476-489. Springer, Heidelberg (2007)
    • (2007) Public Key Cryptography-PKC 2007 , vol.4450 , pp. 476-489
    • Lai, J.1    Kou, K.2
  • 24
    • 33745833916 scopus 로고    scopus 로고
    • On constructing certificateless cryptosystems from identity based encryption
    • In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Libert, B., Quisquater, J.J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Public Key Cryptography-PKC 2006. Lecture Notes in Computer Science, vol. 3958, pp. 474-490. Springer, Heidelberg (2006)
    • (2006) Public Key Cryptography-PKC 2006 , vol.3958 , pp. 474-490
    • Libert, B.1    Quisquater, J.J.2
  • 26
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120-126 (1978)
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 27
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • In: Blakley, G.R., Chaum, D. (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology-Crypto-84. Lecture Notes in Computer Science, vol. 196, pp. 47-53. Springer, Heidelberg (1984)
    • (1984) Advances in Cryptology-Crypto -84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 30
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • In: Cramer, R. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) Advances in Cryptology-EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , vol.3494 , pp. 114-127
    • Waters, B.1
  • 31
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • In: A.L. et al. (ed.) Lecture Notes in Computer Science Springer, Heidelberg
    • Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: A.L. et al. (ed.) Computational Science and Its Applications-ICCSA 2004: Part I. Lecture Notes in Computer Science, vol. 3043, pp. 802-811. Springer, Heidelberg (2004)
    • (2004) Computational Science and Its Applications-ICCSA 2004: Part I , vol.3043 , pp. 802-811
    • Yum, D.H.1    Lee, P.J.2
  • 32
    • 33645601534 scopus 로고    scopus 로고
    • Identity-based cryptography in public key management
    • In: Katsikas, S.K., Gritzalis, S., Lopez, J., (eds.) Lecture Notes in Computer Science Springer, Heidelberg
    • Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J., (eds.) Public Key Infrastructure: 1st European PKI Workshop (EuroPKI 2004). Lecture Notes in Computer Science, vol. 3093, pp. 71-84. Springer, Heidelberg (2004)
    • (2004) Public Key Infrastructure: 1st European PKI Workshop (EuroPKI 2004) , vol.3093 , pp. 71-84
    • Yum, D.H.1    Lee, P.J.2
  • 34
    • 33746591632 scopus 로고    scopus 로고
    • Certificateless public-key signature: Security model and efficient construction
    • In: Zhou, J., Yung, M., Bao, F. (eds.) Springer, Heidelberg
    • Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3989, pp. 293-308. Springer, Heidelberg (2006)
    • (2006) Applied Cryptography and Network Security. Lecture Notes in Computer Science , vol.3989 , pp. 293-308
    • Zhang, Z.1    Wong, D.S.2    Xu, J.3    Feng, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.