메뉴 건너뛰기




Volumn , Issue , 2008, Pages 18-25

Conditional privacy using re-encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; PARALLEL PROCESSING SYSTEMS;

EID: 57949113919     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPC.2008.37     Document Type: Conference Paper
Times cited : (6)

References (14)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 2
    • 33749661564 scopus 로고    scopus 로고
    • A cryptographic framework for the controlled release of certified data
    • B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, of, Springer
    • E. Bangerter, J. Camenisch, and A. Lysyanskaya. A cryptographic framework for the controlled release of certified data. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, volume 3957 of LNCS, pages 20-42. Springer, 2004.
    • (2004) LNCS , vol.3957 , pp. 20-42
    • Bangerter, E.1    Camenisch, J.2    Lysyanskaya, A.3
  • 3
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated diffiehellman key agreement protocols
    • S. E. Tavares and H. Meijer, editors, Selected Areas in Cryptography, of, Springer
    • S. Blake-Wilson and A. Menezes. Authenticated diffiehellman key agreement protocols. In S. E. Tavares and H. Meijer, editors, Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, pages 339-361. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1556 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 4
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • T. Okamoto, editor, ASIACRYPT, of, Springer
    • J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In T. Okamoto, editor, ASIACRYPT, volume 1976 of LNCS, pages 331-345. Springer, 2000.
    • (2000) LNCS , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 5
    • 35248839965 scopus 로고    scopus 로고
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, SCN, 2576 of LNCS, pages 268-289. Springer, 2002.
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, SCN, volume 2576 of LNCS, pages 268-289. Springer, 2002.
  • 6
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • M. K. Franklin, editor, CRYPTO, of, Springer
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. K. Franklin, editor, CRYPTO, volume 3152 of LNCS, pages 56-72. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • D. Boneh, editor, CRYPTO, of, Springer
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, CRYPTO, volume 2729 of LNCS, pages 126-144. Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 8
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • G. Brassard, editor, CRYPTO, of, Springer
    • Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 307-315. Springer, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 35048899238 scopus 로고    scopus 로고
    • Universal re-encryption for mixnets
    • T. Okamoto, editor, CT-RSA, of, Springer
    • P. Golle, M. Jakobsson, A. Juels, and P. F. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages 163-178. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2964 , pp. 163-178
    • Golle, P.1    Jakobsson, M.2    Juels, A.3    Syverson, P.F.4
  • 11
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • The Internet Society
    • A.-A. Ivan and Y. Dodis. Proxy cryptography revisited. In NDSS. The Internet Society, 2003.
    • (2003) NDSS
    • Ivan, A.-A.1    Dodis, Y.2
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 57949117183 scopus 로고    scopus 로고
    • Conditional privacy using re-encryption
    • Technical Report 14076, Queensland University of Technology, October
    • S. Suriadi, E. Foo, and J. Smith. Conditional privacy using re-encryption. Technical Report 14076, Queensland University of Technology, October 2008. http://eprints.qut.edu.au/archive/00014076/.
    • (2008)
    • Suriadi, S.1    Foo, E.2    Smith, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.