메뉴 건너뛰기




Volumn 5473, Issue , 2009, Pages 32-47

Universally anonymous IBE based on the quadratic residuosity assumption

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 67650132611     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00862-7_3     Document Type: Conference Paper
Times cited : (25)

References (24)
  • 3
    • 35248851617 scopus 로고    scopus 로고
    • Correlation-Resistant Storage via KeywordSearchable Encryption
    • Report 2005/417
    • Ballard, L., Green, M., de Medeiros, B., Monrose, F.: Correlation-Resistant Storage via KeywordSearchable Encryption. In: Cryptology ePrint Archive, Report 2005/417 (2005), http://eprint.iacr.org/2005/417
    • (2005) Cryptology ePrint Archive
    • Ballard, L.1    Green, M.2    De Medeiros, B.3    Monrose, F.4
  • 4
    • 84946837370 scopus 로고    scopus 로고
    • Key-Privacy in Public-Key Encryption
    • Advances in Cryptology - ASIACRYPT 2001
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001) (Pubitemid 33371207)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 5
    • 33645751082 scopus 로고    scopus 로고
    • Generic constructions of identity-based and certificateless KEMs
    • Report 2005/058
    • Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic Constructions of Identity-Based and Certificateless KEMs. In: Cryptology ePrint Archive, Report 2005/058 (2005), http://eprint.iacr.org/2005/058
    • (2005) Cryptology ePrint Archive
    • Bentahar, K.1    Farshim, P.2    Malone-Lee, J.3    Smart, N.4
  • 6
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • In: Franklin, M. (ed.) Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 7
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • In: Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586-615 (2003)
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • In: Honary, B. (ed.) Springer, Heidelberg
    • Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001. LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 12
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 13
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing 33(1), 167-226 (2004)
    • (2004) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 14
    • 38349025630 scopus 로고    scopus 로고
    • Public key encryption with searchable keywords based on jacobi symbols
    • In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) Springer, Heidelberg
    • Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282-296. Springer, Heidelberg (2007)
    • (2007) INDOCRYPT 2007. LNCS , vol.4859 , pp. 282-296
    • Di Crescenzo, G.1    Saraswat, V.2
  • 15
    • 85027148495 scopus 로고
    • On the randomness of legendre and jacobi sequences
    • In: Goldwasser, S. (ed.) Springer, Heidelberg
    • Damgård, I.B.: On the Randomness of Legendre and Jacobi Sequences. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 163-172. Springer, Heidelberg (1990)
    • (1990) CRYPTO 1988. LNCS , vol.403 , pp. 163-172
    • Damgård, I.B.1
  • 16
    • 33646764832 scopus 로고    scopus 로고
    • A sufficient condition for key-privacy
    • Report 2005/05
    • Halevi, S.: A Sufficient Condition for Key-Privacy. In: Cryptology ePrint Archive, Report 2005/05 (2005), http://eprint.iacr.org/2005/005
    • (2005) Cryptology ePrint Archive
    • Halevi, S.1
  • 20
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated ID-based key exchange and remote log-in with insecure token and PIN number
    • Report 2002/164
    • Scott, M.: Authenticated ID-based Key Exchange and Remote Log-in With Insecure Token and PIN Number. In: Cryptology ePrint Archive, Report 2002/164 (2002), http://eprint.iacr.org/2002/164
    • (2002) Cryptology ePrint Archive
    • Scott, M.1
  • 21
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • In: Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 22
    • 84869369574 scopus 로고    scopus 로고
    • Shamus software
    • Shamus Software. The MIRACL library, http://www.shamus.ie
    • The MIRACL library


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.