메뉴 건너뛰기




Volumn 1, Issue 1, 2008, Pages 3-21

A tapestry of identity-based encryption: Practical frameworks compared

Author keywords

Applied identity based encryption; Bilinear pairings; Comparison survey

Indexed keywords


EID: 67650159910     PISSN: 17530563     EISSN: 17530571     Source Type: Journal    
DOI: 10.1504/IJACT.2008.017047     Document Type: Article
Times cited : (74)

References (49)
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Springer-Verlag
    • Boneh, D. and Boyen, X. (2004a) 'Efficient selective-ID secure identity based encryption without random oracles', Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 LNCS, Springer-Verlag, pp. 223-238.
    • (2004) Advances in Cryptology - EUROCRYPT 2004, LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Springer-Verlag
    • Boneh, D. and Boyen, X. (2004b) 'Short signatures without random oracles', Advances in Cryptology - EUROCRYPT 2004, Vol. 3027 LNCS, Springer-Verlag, pp. 56-73.
    • (2004) Advances in Cryptology - EUROCRYPT 2004, LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Boyen, X. and Goh, E-J. (2005) 'Hierarchical identity based encryption with constant size cipher-text', Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of LNCS, Springer-Verlag, pp. 440-456. (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D. and Franklin, M. (2001) 'Identity-based encryption from the Weil pairing', Advances in Cryptology - CRYPTO 2001, Vol. 2139 of LNCS, Springer-Verlag, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • DOI 10.1007/s00145-004-0314-9
    • Boneh, D., Lynn, B. and Shacham, H. (2004b) 'Short signatures from the Weil pairing', Journal of Cryptology, Vol. 17, No. 4, pp. 297-319. (Pubitemid 41201461)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 12
    • 38049123546 scopus 로고    scopus 로고
    • General ad hoc encryption from exponent inversion IBE
    • Springer-Verlag
    • Boyen, X. (2007) 'General ad hoc encryption from exponent inversion IBE', Advances in Cryptology - EUROCRYPT 2007, Vol. 4515 of LNCS, Springer-Verlag, pp. 394-411.
    • (2007) Advances in Cryptology - EUROCRYPT 2007, LNCS , vol.4515 , pp. 394-411
    • Boyen, X.1
  • 15
    • 34547397004 scopus 로고    scopus 로고
    • Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model
    • Chatterjee, S. and Sarkar, P. (2005) Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In Proceedings of ICISC 2005.
    • (2005) Proceedings of ICISC , vol.2005
    • Chatterjee, S.1    Sarkar, P.2
  • 16
    • 33750714478 scopus 로고    scopus 로고
    • Security proof of Sakai-Kasahara's identity-based encryption scheme
    • Chen, L. and Cheng, Z. (2005) 'Security proof of Sakai-Kasahara's identity-based encryption scheme', Cryptology ePrint Archive, Report 2005/226, Available at: http://eprint.iacr.org/.
    • (2005) Cryptology EPrint Archive, Report 2005/226
    • Chen, L.1    Cheng, Z.2
  • 20
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer-Verlag
    • Cramer, R. and Shoup, V. (1998) 'A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack', Advances in Cryptology - CRYPTO 1998, Vol. 1462 of LNCS, Springer-Verlag.
    • (1998) Advances in Cryptology - CRYPTO 1998, LNCS , vol.1462
    • Cramer, R.1    Shoup, V.2
  • 21
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Springer-Verlag
    • Cramer, R. and Shoup, V. (2002) 'Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption', Advances in Cryptology - EUROCRYPT 2002, Vol. 2729 of LNCS, Springer-Verlag, pp. 45-64.
    • (2002) Advances in Cryptology - EUROCRYPT 2002, LNCS , vol.2729 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 23
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Springer-Verlag
    • Gentry, C. (2006) 'Practical identity-based encryption without random oracles', Advances in Cryptology - EUROCRYPT 2006, LNCS, Springer-Verlag.
    • (2006) Advances in Cryptology - EUROCRYPT 2006, LNCS
    • Gentry, C.1
  • 24
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Springer-Verlag
    • Gentry, C. and Silverberg, A. (2002) 'Hierarchical ID-based cryptography', Proceedings of ASIACRYPT 2002, Vol. 2501 of LNCS, Springer-Verlag, pp. 548-566.
    • (2002) Proceedings of ASIACRYPT 2002, LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 28
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • DOI 10.1007/s00145-004-0312-y
    • Joux, A. (2004) 'Aone round protocol for tripartite Diffie-Hellman', Journal of Cryptology, Vol. 17, No. 4, pp. 263-276. (Pubitemid 41201459)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 29
    • 21144454271 scopus 로고    scopus 로고
    • Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
    • DOI 10.1007/s00145-003-0052-4
    • Joux, A. and Nguyen, K. (2003) 'Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups', Journal of Cryptology, Vol. 16, No. 4, pp. 239-247. (Pubitemid 40877275)
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 30
    • 26444602504 scopus 로고    scopus 로고
    • Identity based encryption without redundancy
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Libert, B. and Quisquater, J.-J. (2005) 'Identity based encryption without redundancy', Proceedings of ACNS 2005, Vol. 3531 of LNCS, Springer-Verlag, pp. 285-300. (Pubitemid 41422123)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 285-300
    • Libert, B.1    Quisquater, J.-J.2
  • 32
    • 0012132506 scopus 로고    scopus 로고
    • A non-interactive public-key distribution system
    • Maurer, M. U. andYacobi,Y. (1996), 'A non-interactive public-key distribution system', Designs, Codes and Cryptography, Vol. 9 No. 3, pp. 305-316. (Pubitemid 126708421)
    • (1996) Designs, Codes, and Cryptography , vol.9 , Issue.3 , pp. 305-316
    • Maurer, U.M.1    Yacobi, Y.2
  • 33
    • 22144445920 scopus 로고    scopus 로고
    • The Weil pairing, and its efficient calculation
    • Miller, V. (2004) 'The Weil pairing, and its efficient calculation', Journal of Cryptology, Vol. 17, No. 4.
    • (2004) Journal of Cryptology , vol.17 , Issue.4
    • Miller, V.1
  • 36
  • 39
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing over elliptic curve
    • Sakai, R. and Kasahara, M. (2003) 'ID based cryptosystems with pairing over elliptic curve', Cryptology ePrint Archive, Report 2003/054. Available at: http://eprint.iacr.org/2003/054/.
    • (2003) Cryptology EPrint Archive, Report 2003/054
    • Sakai, R.1    Kasahara, M.2
  • 41
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag
    • Shamir, A. (1984) 'Identity-based cryptosystems and signature schemes', Advances in Cryptology - CRYPTO 1984, Vol. 196 of LNCS, Springer-Verlag, pp. 47-53.
    • (1984) Advances in Cryptology - CRYPTO 1984, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 42
    • 84942550160 scopus 로고    scopus 로고
    • Lower Bounds for Discrete Logarithms and Related Problems
    • Advances in Cryptology - Eurocrypt '97
    • Shoup, V. (1997) 'Lower bounds for discrete logarithms and related problems', Advances in Cryptology - EUROCRYPT 1997, Vol. 1233 of LNCS, Springer-Verlag, pp. 256-266. (Pubitemid 127067806)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 256-266
    • Shoup, V.1
  • 43
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • Springer-Verlag
    • Shoup, V. (2000) 'Using hash functions as a hedge against chosen ciphertext attack', Advances in Cryptology - EUROCRYPT 2000, LNCS, Springer-Verlag.
    • (2000) Advances in Cryptology - EUROCRYPT 2000, LNCS
    • Shoup, V.1
  • 44
    • 79953303545 scopus 로고    scopus 로고
    • A proposal for an ISO standard for public key encryption (version 2.1)
    • Shoup, V. (2001) 'A proposal for an ISO standard for public key encryption (version 2.1)', Manuscript, Available at: http: //shoup.net/papers/.
    • (2001) Manuscript
    • Shoup, V.1
  • 46
    • 85032215902 scopus 로고
    • A realization scheme for the identity-based cryptosystem
    • Springer-Verlag
    • Tanaka, H. (1987) 'A realization scheme for the identity-based cryptosystem', Advances in Cryptology - CRYPTO 1987, Vol. 293 of LNCS, Springer-Verlag, pp. 341-349.
    • (1987) Advances in Cryptology - CRYPTO 1987, LNCS , vol.293 , pp. 341-349
    • Tanaka, H.1
  • 47
    • 0024664858 scopus 로고
    • An ID-based cryptosystem based on the discrete logarithm problem
    • Tsujii, S. and Itoh, T. (1989) 'An ID-based cryptosystem based on the discrete logarithm problem', IEEE Journal on Selected Areas in Communication, Vol. 7, No. 4, pp. 467-473.
    • (1989) IEEE Journal on Selected Areas in Communication , vol.7 , Issue.4 , pp. 467-473
    • Tsujii, S.1    Itoh, T.2
  • 48
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer-Verlag
    • Waters, B. (2005) 'Efficient identity-based encryption without random oracles', Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of LNCS, Springer-Verlag.
    • (2005) Advances in Cryptology - EUROCRYPT 2005, LNCS , vol.3494
    • Waters, B.1
  • 49
    • 14844297376 scopus 로고    scopus 로고
    • ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Yao, D., Fazio, N., Dodis, Y. and Lysyanskaya, A. (2004) 'ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption', ACM Conference on Computer and Communications Security - CCS 2004, ACM Press, pp. 354-363. (Pubitemid 40338216)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 354-363
    • Yao, D.1    Dodis, Y.2    Fazio, N.3    Lysyanskaya, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.