메뉴 건너뛰기




Volumn , Issue , 2008, Pages 373-380

Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

Author keywords

Multi receiver identity based key encapsulation

Indexed keywords

CIPHERTEXTS; IDENTITY-BASED; KEY ENCAPSULATION MECHANISMS; MULTI-RECEIVER; PLAINTEXT; PRIVATE KEY; PUBLIC KEYS; RANDOM ORACLE; SECURITY FLAWS; SUBLINEAR;

EID: 67650102817     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368366     Document Type: Conference Paper
Times cited : (17)

References (20)
  • 1
    • 38049061158 scopus 로고    scopus 로고
    • Generalized key delegation for hierarchical identity-based encryption
    • of LNCS, Springer
    • M. Abdalla, E. Kiltz, and G. Neven. Generalized key delegation for hierarchical identity-based encryption. In Proc. ESORICS 2007, volume 4734 of LNCS, pages 139-154. Springer, 2007.
    • (2007) Proc. ESORICS 2007 , vol.4734 , pp. 139-154
    • Abdalla, M.1    Kiltz, E.2    Neven, G.3
  • 2
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • of LNCS, Springer
    • J. Baek, R. Safavi-Naini, and W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In Proc. PKC 2005, volume 3386 of LNCS, pages 380-397. Springer, 2005.
    • (2005) Proc. PKC 2005 , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 33646823652 scopus 로고    scopus 로고
    • Efficient identity-based key encapsulation to multiple parties
    • of LNCS, Springer
    • M. Barosa and P. Farshim. Efficient identity-based key encapsulation to multiple parties. In Proc. IMA 2005, volume 3796 of LNCS, pages 428-441. Springer, 2005.
    • (2005) Proc. IMA 2005 , vol.3796 , pp. 428-441
    • Barosa, M.1    Farshim, P.2
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • of LNCS, Springer
    • D. Boneh and X. Boyen. Efficient selective-id secure identity based encryption without random oracles. In Proc. Eurocrypt 2004, volume 3027 of LNCS, pages 223-238. Springer, 2004.
    • (2004) Proc. Eurocrypt 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • of LNCS, Springer
    • D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. In Proc. Eurocrypt 2005, volume 3494 of LNCS, pages 440-456. Springer, 2005.
    • (2005) Proc. Eurocrypt 2005 , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • of LNCS, Springer
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proc. CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) Proc. CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for cca-secure cryptosystems built using identity-based encryption
    • of LNCS, Springer
    • D. Boneh and J. Katz. Improved efficiency for cca-secure cryptosystems built using identity-based encryption. In Proc. CT-RSA 2005, volume 3376 of LNCS, pages 87-103. Springer, 2005.
    • (2005) Proc. CT-RSA 2005 , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 10
    • 35048852705 scopus 로고    scopus 로고
    • Chosen ciphertext security from identity-based encryption
    • of LNCS, Springer
    • C. Canetti, S. Halevi, and J. Katz. Chosen ciphertext security from identity-based encryption. In Proc. Eurocrypt 2004, volume 3027 of LNCS, pages 207-222. Springer, 2004.
    • (2004) Proc. Eurocrypt 2004 , vol.3027 , pp. 207-222
    • Canetti, C.1    Halevi, S.2    Katz, J.3
  • 11
    • 33745819179 scopus 로고    scopus 로고
    • Generalization of the selective-id security model for hibe protocols
    • of LNCS, Springer
    • S. Chatterjee and P. Sarkar. Generalization of the selective-id security model for hibe protocols. In Proc. PKC 2006, volume 3958 of LNCS, pages 241-256. Springer, 2006.
    • (2006) Proc. PKC 2006 , vol.3958 , pp. 241-256
    • Chatterjee, S.1    Sarkar, P.2
  • 12
    • 85025586099 scopus 로고    scopus 로고
    • Multi-receiver identity-based key encapsulation with shortened ciphertext
    • of LNCS, Springer
    • S. Chatterjee and P. Sarkar. Multi-receiver identity-based key encapsulation with shortened ciphertext. In Proc. Indocrypt 2006, volume 4329 of LNCS, pages 394-408. Springer, 2006.
    • (2006) Proc. Indocrypt 2006 , vol.4329 , pp. 394-408
    • Chatterjee, S.1    Sarkar, P.2
  • 13
    • 77952390413 scopus 로고
    • ibe-3. In, TeX Users Group, March
    • C. Cocks. ibe-3. In TeX90 Conference Proceedings, pages 84-89. TeX Users Group, March 1991.
    • (1991) TeX90 Conference Proceedings , pp. 84-89
    • Cocks, C.1
  • 14
    • 20444502239 scopus 로고    scopus 로고
    • An id-based broadcast encryptoin scheme for key distribution
    • X. Du, Y. Wang, J. Ge, and Y. Wang. An id-based broadcast encryptoin scheme for key distribution. IEEE Transaction on Broadcasting, 51 (2):264-266, 2005.
    • (2005) IEEE Transaction on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 16
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • of LNCS, Springer
    • C. Gentry. Practical identity-based encryption without random oracles. In Proc. Eurocrypt 2006, volume 4004 of LNCS, pages 445-464. Springer, 2006.
    • (2006) Proc. Eurocrypt 2006 , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 17
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • of LNCS, Springer
    • C. Gentry and A. Silverberg. Hierarchical id-based cryptography. In Proc. Asiacrypt 2002, volume 2501 of LNCS, pages 548-566. Springer, 2002.
    • (2002) Proc. Asiacrypt 2002 , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • of LNCS, Springer
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 1984, volume 196 of LNCS, pages 47-53. Springer, 1984.
    • (1984) Proc. CRYPTO 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 20
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • of LNCS, Springer
    • B. Waters. Efficient identity-based encryption without random oracles. In Proc. Eurocrypt 2005, volume 3494 of LNCS, pages 114-124. Springer, 2005.
    • (2005) Proc. Eurocrypt 2005 , vol.3494 , pp. 114-124
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.