메뉴 건너뛰기




Volumn 52, Issue 2, 2009, Pages 219-241

On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups

Author keywords

Identity based encryption; Identity based non interactive key distribution; Trapdoor discrete logs

Indexed keywords

ENCRYPTION/DECRYPTION; IDENTITY-BASED ENCRYPTION; IDENTITY-BASED NON-INTERACTIVE KEY DISTRIBUTION; PROVABLY SECURE; SECURITY MODELS; TRAPDOOR DISCRETE LOGS; TRUSTED AUTHORITIES;

EID: 63349083067     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-009-9278-y     Document Type: Article
Times cited : (42)

References (38)
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson D.R. (ed.) Springer-Verlag
    • Bellare M., Rogaway P.: Entity authentication and key distribution. In: Stinson D.R. (ed.) CRYPTO'93, LNCS 773, pp. 232-249. Springer-Verlag (1994).
    • (1994) CRYPTO'93, LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • ACM Press
    • Bellare M., Canetti R., Krawczyk H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th STOC, pp. 419-428. ACM Press (1998).
    • (1998) 30th STOC , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 43249104504 scopus 로고    scopus 로고
    • Generic constructions of identity-based and certificateless KEMs
    • K. Bentahar P. Farshim J. Malone-Lee N.P. Smart 2008 Generic constructions of identity-based and certificateless KEMs J. Cryptol. 21 2 178 199
    • (2008) J. Cryptol. , vol.21 , Issue.2 , pp. 178-199
    • Bentahar, K.1    Farshim, P.2    Malone-Lee, J.3    Smart, N.P.4
  • 5
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Darnell M. (ed.) Cryptography and Coding, 6th IMA International Conference Springer-Verlag
    • Blake-Wilson S., Johnson D., Menezes A.: Key agreement protocols and their security analysis. In: Darnell M. (ed.) Cryptography and Coding, 6th IMA International Conference, LNCS 1355, pp. 30-45. Springer-Verlag (1997).
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian J. (ed.) CRYPTO 2001 Springer-Verlag
    • Boneh D., Franklin M.: Identity-based encryption from the Weil pairing. In: Kilian J. (ed.) CRYPTO 2001, LNCS 2139, pp. 213-229. Springer-Verlag (2001).
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryption without pairings
    • IEEE Computer Society Full version available at Cryptology ePrint Archive, Report 2007/177
    • Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), pp. 647-657. IEEE Computer Society (2007). Full version available at Cryptology ePrint Archive, Report 2007/177. http://eprint.iacr.org/.
    • (2007) 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007) , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 8
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • Jakobsson M., et al. (eds.) ACNS 2004 Springer-Verlag
    • Boyd C., Mao W., Paterson K.G.: Key agreement using statically keyed authenticators. In: Jakobsson M., et al. (eds.) ACNS 2004, LNCS 3089, pp. 248-262. Springer-Verlag (2004).
    • (2004) LNCS , vol.3089 , pp. 248-262
    • Boyd, C.1    Mao, W.2    Paterson, K.G.3
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann B. (ed.) EUROCRYPT 2001 Springer-Verlag
    • Canetti R., Krawczyk H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B. (ed.) EUROCRYPT 2001, LNCS 2045, pp. 453-474. Springer-Verlag (2001).
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 11
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Honary B. (ed.) Cryptography and Coding, 8th IMA International Conference Springer-Verlag
    • Cocks C.: An identity based encryption scheme based on quadratic residues. In: Honary B. (ed.) Cryptography and Coding, 8th IMA International Conference, LNCS 2260, pp. 360-363. Springer-Verlag (2001).
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 12
    • 33746690345 scopus 로고    scopus 로고
    • Hidden pairings and trapdoor DDH groups
    • Hess F., Pauli S., Pohst M. (eds.) Algorithmic Number Theory: 7th International Symposium (ANTS VII) Springer-Verlag
    • Dent A.W., Galbraith S.D.: Hidden pairings and trapdoor DDH groups. In: Hess F., Pauli S., Pohst M. (eds.) Algorithmic Number Theory: 7th International Symposium (ANTS VII), LNCS 4076, pp. 436-451. Springer-Verlag (2006).
    • (2006) LNCS , vol.4076 , pp. 436-451
    • Dent, A.W.1    Galbraith, S.D.2
  • 13
    • 29244438183 scopus 로고    scopus 로고
    • Provably secure non-interactive key distribution based on pairings
    • See also cryptology ePrint archive, report 2002/136 (2002)
    • Dupont R., Enge A.: Provably secure non-interactive key distribution based on pairings. Discrete Appl. Math. 154(2), 270-276 (2006). See also cryptology ePrint archive, report 2002/136 (2002). http://eprint.iacr.org/.
    • (2006) Discrete Appl. Math. , vol.154 , Issue.2 , pp. 270-276
    • Dupont, R.1    Enge, A.2
  • 14
    • 84947261826 scopus 로고    scopus 로고
    • Extending the GHS Weil descent attack
    • Knudsen L. (ed.) EUROCRYPT 2002 Springer-Verlag
    • Galbraith S., Hess F., Smart N.P.: Extending the GHS Weil descent attack. In: Knudsen L. (ed.) EUROCRYPT 2002, LNCS 2332, pp. 29-44. Springer-Verlag (2002).
    • (2002) LNCS , vol.2332 , pp. 29-44
    • Galbraith, S.1    Hess, F.2    Smart, N.P.3
  • 15
    • 53249117524 scopus 로고    scopus 로고
    • Pairings for cryptographers
    • Available from cryptology ePrint archive: report 2006/165 (2006)
    • Galbraith S.D., Paterson K.G., Smart N.P.: Pairings for cryptographers. Discrete Appl. Math. 156, 3113-3121 (2008). Available from cryptology ePrint archive: report 2006/165 (2006). http://eprint.iacr.org/.
    • (2008) Discrete Appl. Math. , vol.156 , pp. 3113-3121
    • Galbraith, S.D.1    Paterson, K.G.2    Smart, N.P.3
  • 16
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Ladner R.E., Dwork C. (eds.) ACM Full version available from cryptology ePrint archive: report 2007/432 (2007)
    • Gentry C., Peikert C., Vaikuntanathan V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner R.E., Dwork C. (eds.) Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 197-206, ACM (2008). Full version available from cryptology ePrint archive: report 2007/432 (2007). http://eprint.iacr.org/.
    • (2008) Proceedings of the 40th Annual ACM Symposium on Theory of Computing , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 17
    • 0038629591 scopus 로고
    • Designing and detecting trapdoors for discrete log cryptosystems
    • Brickell E.F. (ed.) CRYPTO'92 Springer-Verlag
    • Gordon D.M.: Designing and detecting trapdoors for discrete log cryptosystems. In: Brickell E.F. (ed.) CRYPTO'92, LNCS 740, pp. 66-75. Springer-Verlag (1993).
    • (1993) LNCS , vol.740 , pp. 66-75
    • Gordon, D.M.1
  • 18
    • 32244433334 scopus 로고    scopus 로고
    • K-resilient identity-based encryption in the standard model
    • Okamoto T. (ed.) CT-RSA 2004 Springer-Verlag
    • Heng S.-H., Kurosawa K.: k-resilient identity-based encryption in the standard model. In: Okamoto T. (ed.) CT-RSA 2004, LNCS 2964, pp. 67-80. Springer-Verlag (2004).
    • (2004) LNCS , vol.2964 , pp. 67-80
    • Heng, S.-H.1    Kurosawa, K.2
  • 19
    • 17644440160 scopus 로고    scopus 로고
    • Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
    • D. Hühnlein M.J. Jacobson Jr. D. Weber 2003 Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders Des. Codes Cryptogr. 39 3 281 299
    • (2003) Des. Codes Cryptogr. , vol.39 , Issue.3 , pp. 281-299
    • Hühnlein, D.1    Jacobson Jr., M.J.2    Weber, D.3
  • 20
    • 33746332411 scopus 로고    scopus 로고
    • Generic transforms to acquire CCA-security for identity based encryption: The cases of FOpkc and REACT
    • Batten L.M., Safavi-Naini R. (eds.) ACISP 2006 Springer-Verlag
    • Kitagawa T., Yang P., Hanaoka G., Zhang R., Watanabe H., Matsuura K., Imai H.: Generic transforms to acquire CCA-security for identity based encryption: the cases of FOpkc and REACT. In: Batten L.M., Safavi-Naini R. (eds.) ACISP 2006, LNCS 4058, pp. 348-359. Springer-Verlag (2006).
    • (2006) LNCS , vol.4058 , pp. 348-359
    • Kitagawa, T.1    Yang, P.2    Hanaoka, G.3    Zhang, R.4    Watanabe, H.5    Matsuura, K.6    Imai, H.7
  • 21
    • 0242292905 scopus 로고    scopus 로고
    • A note on the weakness of the Maurer-Yacobi squaring method
    • Department of Computer Science, Technical University of Darmstadt, Darmstadt, Germany
    • Kügler D., Maurer M.: A Note on the Weakness of the Maurer-Yacobi Squaring Method. Technical Report TI-15/99. Department of Computer Science, Technical University of Darmstadt, Darmstadt, Germany (1999).
    • (1999) Technical Report TI-15/99
    • Kügler, D.1
  • 23
    • 3042658813 scopus 로고    scopus 로고
    • Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
    • W.-B. Lee K.-C. Liao 2004 Constructing identity-based cryptosystems for discrete logarithm based cryptosystems J. Netw. Comput. Appl. 27 191 199
    • (2004) J. Netw. Comput. Appl. , vol.27 , pp. 191-199
    • Lee, W.-B.1    Liao, K.-C.2
  • 24
    • 35748952969 scopus 로고
    • Modified Maurer-Yacobi's scheme and its applications
    • Seberry J., Zheng Y. (eds.) ASIACRYPT92 Springer-Verlag
    • Lim C.H., Lee P.J.: Modified Maurer-Yacobi's scheme and its applications. In: Seberry J., Zheng Y. (eds.) ASIACRYPT92, LNCS 718, pp. 308-323. Springer-Verlag (1992).
    • (1992) LNCS , vol.718 , pp. 308-323
    • Lim, C.H.1    Lee, P.J.2
  • 25
    • 3042553102 scopus 로고
    • Non-interactive public-key cryptography
    • Davies D.W. (ed.) EUROCRYPT91 Springer-Verlag
    • Maurer U., Yacobi Y.: Non-interactive public-key cryptography. In: Davies D.W. (ed.) EUROCRYPT91, LNCS 547, pp. 498-507. Springer-Verlag (1991).
    • (1991) LNCS , vol.547 , pp. 498-507
    • Maurer, U.1    Yacobi, Y.2
  • 26
    • 85027164248 scopus 로고
    • A remark on a non-interactive public-key distribution system
    • Rueppel R.A. (ed.) EUROCRYPT92 Springer-Verlag
    • Maurer U., Yacobi Y.: A remark on a non-interactive public-key distribution system. In: Rueppel R.A. (ed.) EUROCRYPT92, LNCS 658, pp. 458-460. Springer-Verlag (1993).
    • (1993) LNCS , vol.658 , pp. 458-460
    • Maurer, U.1    Yacobi, Y.2
  • 27
    • 0012132506 scopus 로고    scopus 로고
    • A non-interactive public-key distribution system
    • U.M. Maurer Y. Yacobi 1996 A non-interactive public-key distribution system Des. Codes Cryptogr. 9 3 305 316
    • (1996) Des. Codes Cryptogr. , vol.9 , Issue.3 , pp. 305-316
    • Maurer, U.M.1    Yacobi, Y.2
  • 29
    • 63349099304 scopus 로고    scopus 로고
    • Murakami-Kasahara ID-based key sharing scheme revisited-in comparison with Maurer-Yacobi schemes
    • Murakami Y., Kasahara M.: Murakami-Kasahara ID-based key sharing scheme revisited-in comparison with Maurer-Yacobi schemes. Cryptology ePrint archive, report 2005/306 (2005). http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive, Report 2005/306
    • Murakami, Y.1    Kasahara, M.2
  • 30
    • 63349085878 scopus 로고    scopus 로고
    • Security of an identity-based cryptosystem and the related reductions
    • Nyberg K. (ed.) EUROCRYPT98 Springer-Verlag
    • Okamoto T., Uchiyama S.: Security of an identity-based cryptosystem and the related reductions. In: Nyberg K. (ed.) EUROCRYPT98, LNCS 1403, pp. 546-560. Springer-Verlag (1998).
    • (1998) LNCS , vol.1403 , pp. 546-560
    • Okamoto, T.1    Uchiyama, S.2
  • 31
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite-degree residuosity
    • Stern J. (ed.) EUROCRYPT99 Springer-Verlag
    • Paillier P.: Public-key cryptosystems based on composite-degree residuosity. In: Stern J. (ed.) EUROCRYPT99, LNCS 1592, pp. 223-238. Springer-Verlag (1999).
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 35
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakley G.R., Chaum D. (eds.) CRYPTO84 Springer-Verlag
    • Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley G.R., Chaum D. (eds.) CRYPTO84, LNCS 196, pp. 47-53. Springer-Verlag (1985).
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 36
    • 29644436612 scopus 로고    scopus 로고
    • An elliptic curve trapdoor system
    • E. Teske 2006 An elliptic curve trapdoor system J. Cryptol. 19 1 115 133
    • (2006) J. Cryptol. , vol.19 , Issue.1 , pp. 115-133
    • Teske, E.1
  • 37
    • 3042551124 scopus 로고    scopus 로고
    • ID-based cryptographic schemes using a non-interactive public-key distribution system
    • IEEE Computer Society
    • Tseng Y.-M., Jan J.-K.: ID-based cryptographic schemes using a non-interactive public-key distribution system. In: ACSAC 1998, pp. 237-243. IEEE Computer Society (1998).
    • (1998) ACSAC 1998 , pp. 237-243
    • Tseng, Y.-M.1    Jan, J.-K.2
  • 38
    • 33745678280 scopus 로고    scopus 로고
    • Applying Fujisaki-Okamoto to identity-based encryption
    • Fossorier M., et al. (eds.) AAECC 2006 Springer- Verlag
    • Yang P., Kitagawa T., Hanaoka G., Zhang R., Matsuura K., Imai H.: Applying Fujisaki-Okamoto to identity-based encryption. In: Fossorier M., et al. (eds.) AAECC 2006, LNCS 3857, pp. 183-192. Springer- Verlag (2006).
    • (2006) LNCS , vol.3857 , pp. 183-192
    • Yang, P.1    Kitagawa, T.2    Hanaoka, G.3    Zhang, R.4    Matsuura, K.5    Imai, H.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.