메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 407-424

Simulation without the artificial abort: Simplified proof and improved concrete security for waters' IBE Scheme

Author keywords

[No Author keywords available]

Indexed keywords

EFFICIENCY IMPROVEMENT; SECURITY ATTRIBUTES;

EID: 67650652427     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_24     Document Type: Conference Paper
Times cited : (82)

References (31)
  • 2
    • 38049061158 scopus 로고    scopus 로고
    • Generalized key delegation for hierarchical identity-based encryption
    • Springer, Heidelberg (2007), In: Biskup, J., Lopez, J. (eds.). LNCS
    • Abdalla, M., Kiltz, E., Neven, G.: Generalized key delegation for hierarchical identity-based encryption. In: Biskup, J., Ĺopez, J. (eds.) ESORICS 2007. LNCS, vol.4734, pp. 139-154. Springer, Heidelberg (2007)
    • (2007) ESORICS 2007 , vol.4734 , pp. 139-154
    • Abdalla, M.1    Kiltz, E.2    Neven, G.3
  • 5
    • 38149013028 scopus 로고    scopus 로고
    • Efficient chosen-ciphertext secure identity-based encryption with wildcards
    • Springer, Heidelberg (2007), In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.). LNCS
    • Birkett, J.,Dent,A.W.,Neven,G., Schuldt, J.C.N.:Efficient chosen-ciphertext secure identity-based encryption with wildcards. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.4586, pp. 274-292. Springer, Heidelberg (2007)
    • (2007) ACISP 2007 , vol.4586 , pp. 274-292
    • Birkett, J.1    Dent, W.A.2    Neven, G.3    Schuldt, N.J.C.4
  • 6
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 7
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 38049123546 scopus 로고    scopus 로고
    • General ad hoc encryption from exponent inversion IBE
    • Springer, Heidelberg (2007), In: Naor, M. (ed.). LNCS
    • Boyen, X.: General ad hoc encryption from exponent inversion IBE. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 394-411. Springer, Heidelberg (2007)
    • (2007) EUROCRYPT 2007 , vol.4515 , pp. 394-411
    • Boyen, X.1
  • 10
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • DOI 10.1145/1102120.1102162, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identitybased techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005, November 7-11, pp. 320-329. ACM Press, New York (2005) (Pubitemid 44022015)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 11
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 13
    • 77649262307 scopus 로고    scopus 로고
    • HIBE with short public parameters without random oracle
    • Springer, Heidelberg (2006), In: Lai, X., Chen, K. (eds.). LNCS
    • Chatterjee, S., Sarkar, P.: HIBE with short public parameters without random oracle. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 145- 160. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006 , vol.4284 , pp. 145-160
    • Chatterjee, S.1    Sarkar, P.2
  • 14
    • 85023982750 scopus 로고
    • An improved protocol for demonstrating possession of discrete logarithms and some generalizations
    • Springer, Heidelberg (1988), In: Price, W.L., Chaum, D. (eds.). LNCS
    • Chaum, D., Evertse, J.-H., van de Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.304, pp. 127-141. Springer, Heidelberg (1988)
    • (1988) EUROCRYPT 1987 , vol.304 , pp. 127-141
    • Chaum, D.1    Evertse, H.J.2    Graaf, V.D.J.3
  • 15
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Springer, Heidelberg (2001), In: Honary, B. (ed.). LNCS
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001 , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 18
    • 84911480395 scopus 로고    scopus 로고
    • The exact security of pairing based encryption and signature schemes
    • INRIA Paris (2004)
    • Galindo, D.: The exact security of pairing based encryption and signature schemes. In: Based on a talk at Workshop on Provable Security, INRIA, Paris (2004), http://www.dgalindo.es/galindoEcrypt.pdf
    • (2004) Based on a talk at Workshop on Provable Security
    • Galindo, D.1
  • 20
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • Springer, Heidelberg (2007), In: Kurosawa, K. (ed.). LNCS
    • Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.4833, pp. 265-282. Springer, Heidelberg (2007)
    • (2007) ASIACRYPT 2007 , vol.4833 , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 21
    • 51849152334 scopus 로고    scopus 로고
    • Programmable hash functions and their applications
    • Springer, Heidelberg (2008), In: Wagner, D. (ed.). LNCS
    • Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 21-38. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 21-38
    • Hofheinz, D.1    Kiltz, E.2
  • 22
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Springer, Heidelberg (2002), In: Knudsen, L.R. (ed.). LNCS
    • Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002 , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 23
    • 18744364723 scopus 로고    scopus 로고
    • Efficiency improvements for signature schemes with tight security reductions
    • October 27-30, ACM Press, New York (2003)
    • Katz, J., Ẃang, N.: Efficiency improvements for signature schemes with tight security reductions. In: ACM CCS 2003, October 27-30, pp. 155-164. ACM Press, New York (2003)
    • (2003) ACM CCS 2003 , pp. 155-164
    • Katz, J.1    Wang, N.2
  • 25
    • 84946820591 scopus 로고    scopus 로고
    • Unbelievable security: Matching AES security using public key systems
    • Springer, Heidelberg (2001) In: Boyd, C. (ed.) . LNCS
    • Lenstra, A.K.: Unbelievable security: Matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.2248, pp. 67-86. Springer, Heidelberg (2001)
    • (2001) ASIACRYPT 2001 , vol.2248 , pp. 67-86
    • Lenstra, K.A.1
  • 28
    • 33751508709 scopus 로고    scopus 로고
    • National Institute for Standards and Technology, NIST Special Publication 800-57
    • National Institute for Standards and Technology. Recommendation for Key Management Part 1: General (revised). NIST Special Publication 800-857 (2005)
    • (2005) Recommendation for Key Management Part 1: General (revised)
  • 29
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 31
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.