메뉴 건너뛰기




Volumn 5443, Issue , 2009, Pages 357-376

CCA-secure proxy re-encryption without pairings

Author keywords

CCA security; Collusion resistance; DDH; Random oracle; Unidirectional PRE

Indexed keywords

CHROMIUM COMPOUNDS; NETWORK SECURITY;

EID: 67049100266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00468-1_20     Document Type: Conference Paper
Times cited : (190)

References (36)
  • 1
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 2
    • 67049091537 scopus 로고    scopus 로고
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Internet Society (ISOC): NDSS 2005, pp. 29-43 (2005)
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Internet Society (ISOC): NDSS 2005, pp. 29-43 (2005)
  • 4
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.P.6    Yang, K.7
  • 5
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Lynn, H.Y., Scott, B., Barreto, M., Kim, P.S.L.M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-369. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-369
    • Lynn, H.Y.1    Scott, B.2    Barreto, M.3    Kim, P.S.L.M.4
  • 6
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 7
    • 0345058960 scopus 로고    scopus 로고
    • A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
    • Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37-54. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 37-54
    • Bresson, E.1    Catalano, D.2    Pointcheval, D.3
  • 8
    • 84958612917 scopus 로고    scopus 로고
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, 1296, pp. 410-424. Springer, Heidelberg (1997)
    • Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, vol. 1296, pp. 410-424. Springer, Heidelberg (1997)
  • 9
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, 2007. Full version: Cryptology ePrint Archieve
    • Report 2007/171
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, 2007. Full version: Cryptology ePrint Archieve: Report 2007/171 (2007)
    • (2007)
    • Canetti, R.1    Hohenberger, S.2
  • 10
    • 33646735175 scopus 로고    scopus 로고
    • Secure multicast using proxy encryption
    • Qing,S, Mao,W.,Lopez, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
    • Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing,S., Mao,W.,Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 280-290. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3783 , pp. 280-290
    • Chiu, Y.-P.1    Lei, C.-L.2    Huang, C.-Y.3
  • 11
    • 38149038713 scopus 로고    scopus 로고
    • Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 189-202. Springer, Heidelberg (2007)
    • Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
  • 12
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 13
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re- encryption schemes without pairings
    • CANS, springer, Heidelberg
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re- encryption schemes without pairings. In: CANS 2008. LNCS, vol. 5339, pp. 1-17. springer, Heidelberg (2008), http://eprint.iacr.org/2008/509
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 14
    • 84956859011 scopus 로고    scopus 로고
    • Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, 1560, pp. 53-68. Springer, Heidelberg (1999)
    • Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
  • 15
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration ofasymmetric and symmetric encryption schemes
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration ofasymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 16
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS 2005, pp. 553-562 (2005)
    • (2005) FOCS 2005 , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 17
    • 38049061546 scopus 로고    scopus 로고
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 288-306. Springer, Heidelberg (2007); full version: Cryptology ePrint Archieve: Report 2006/473
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007); full version: Cryptology ePrint Archieve: Report 2006/473
  • 18
    • 84937414062 scopus 로고    scopus 로고
    • Zero-knowledge and code obfuscation
    • Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
    • Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 443-457
    • Hada, S.1
  • 19
    • 70349149683 scopus 로고    scopus 로고
    • Heydt-Benjamin, T.S., Chae, H., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 1-19. Springer, Heidelberg (2006)
    • Heydt-Benjamin, T.S., Chae, H., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1-19. Springer, Heidelberg (2006)
  • 20
    • 38049073133 scopus 로고    scopus 로고
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 233-252. Springer, Heidelberg (2007)
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
  • 22
    • 34247393726 scopus 로고    scopus 로고
    • Khurana, H., Hahm, H.-S.: Certified mailing lists. In: ASIACCS 2006, pp. 46-58(2006)
    • Khurana, H., Hahm, H.-S.: Certified mailing lists. In: ASIACCS 2006, pp. 46-58(2006)
  • 23
    • 85001783793 scopus 로고    scopus 로고
    • Scalable security and accounting services for content- based publish subscribe systems
    • Khurana, H., Koleva, R.: Scalable security and accounting services for content- based publish subscribe systems. International Journal of -Business Research 2(3) (2006)
    • (2006) International Journal of -Business Research , vol.2 , Issue.3
    • Khurana, H.1    Koleva, R.2
  • 25
    • 40249113119 scopus 로고    scopus 로고
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 360-379. Springer, Heidelberg (2008)
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
  • 26
    • 35048877778 scopus 로고    scopus 로고
    • Sequential Aggregate Signatures from Trapdoor Permutations
    • Cachin, C, Camenisch, J.L, eds, EURO-CRYPT 2004, Springer, Heidelberg
    • Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EURO-CRYPT 2004. LNCS, vol. 3027, pp. 74-90. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 27
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on discrete logarithms residues
    • Stern, J, ed, EUROCRYPT 1999, Springer, Hei delberg
    • Paillier, P.: Public-key cryptosystems based on discrete logarithms residues. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Hei delberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 28
    • 0000537828 scopus 로고
    • Efficient identifications and signatures for smart cards
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Schnorr, C.P.: Efficient identifications and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-251. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 239-251
    • Schnorr, C.P.1
  • 29
    • 24144479376 scopus 로고    scopus 로고
    • Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 293-304. Springer, Heidelberg (2005)
    • Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
  • 30
    • 67049120934 scopus 로고    scopus 로고
    • PhD Thesis, Shanghai Jiao Tong University December
    • Shao, J.: Proxy re-cryptography, revisited, PhD Thesis, Shanghai Jiao Tong University (December, 2007)
    • (2007) Proxy re-cryptography, revisited
    • Shao, J.1
  • 31
    • 67049122562 scopus 로고    scopus 로고
    • Analysis of cca secure unidirctional id-based pre scheme
    • Shao, J., Xing, D., Cao, Z.: Analysis of cca secure unidirctional id-based pre scheme. Technical Report of TDT (2008)
    • (2008) Technical Report of TDT
    • Shao, J.1    Xing, D.2    Cao, Z.3
  • 32
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 33
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen cipher- text attack
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen cipher- text attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 35
    • 33751079898 scopus 로고    scopus 로고
    • Talmy, A., Dobzinski, O.: Abuse freedom in access control schemes. In: AINA 2006, pp. 77-86 (2006)
    • Talmy, A., Dobzinski, O.: Abuse freedom in access control schemes. In: AINA 2006, pp. 77-86 (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.