메뉴 건너뛰기




Volumn 5473, Issue , 2009, Pages 279-294

Key-private proxy re-encryption

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXT; CIPHERTEXTS; DIFFIE-HELLMAN ASSUMPTION; DISTRIBUTED FILE SYSTEMS; PRE-CONSTRUCTION; RE-ENCRYPTION; SENSITIVE INFORMATIONS; THE STANDARD MODEL; USEFUL PROPERTIES;

EID: 67650135696     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00862-7_19     Document Type: Conference Paper
Times cited : (156)

References (14)
  • 2
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: NDSS, pp. 29-43 (2005)
    • (2005) NDSS , pp. 29-43
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 84946837370 scopus 로고    scopus 로고
    • Key-Privacy in Public-Key Encryption
    • Advances in Cryptology - ASIACRYPT 2001
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001) (Pubitemid 33371207)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 5
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 6
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • In: Franklin, M. (ed.) Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • ACM, New York
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, pp. 185-194. ACM, New York (2007)
    • (2007) ACM CCS , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 9
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • In: Wiener, M. (ed.) Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 10
    • 38049073133 scopus 로고    scopus 로고
    • Securely obfuscating re-encryption
    • In: Vadhan, S.P. (ed.) Springer, Heidelberg
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 11
    • 79961049494 scopus 로고    scopus 로고
    • From proxy encryption primitives to a deployable secure-mailing-list solution
    • In: Ning, P., Qing, S., Li, N. (eds.) Springer, Heidelberg
    • Khurana, H., Heo, J., Pant, M.: From proxy encryption primitives to a deployable secure-mailing-list solution. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 260-281. Springer, Heidelberg (2006)
    • (2006) ICICS 2006. LNCS , vol.4307 , pp. 260-281
    • Khurana, H.1    Heo, J.2    Pant, M.3
  • 12
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy reencryption
    • In: Cramer, R. (ed.) Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) PKC 2008. LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.