메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 554-571

Verifiable random functions from identity-based key encapsulation

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXT; DE-CAPSULATION; IDENTITY-BASED; KEY ENCAPSULATION MECHANISMS; PSEUDO RANDOM; SECRET KEY; VERIFIABLE RANDOM FUNCTION;

EID: 67650685950     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_32     Document Type: Conference Paper
Times cited : (44)

References (27)
  • 1
    • 43249104504 scopus 로고    scopus 로고
    • Generic constructions of identity-based and certificateless KEMs
    • DOI 10.1007/s00145-007-9000-z
    • Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology 21(2), 178-199 (2008) (Pubitemid 351653335)
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 178-199
    • Bentahar, K.1    Farshim, P.2    Malone-Lee, J.3    Smart, N.P.4
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • In: Cachin, C., Camenisch, J.L. (eds.). LNCS. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • In: Cachin, C., Camenisch, J.L. (eds.). LNCS. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryptionwithout pairings
    • Providence, USA. IEEE Computer Society Press, Los Alamitos
    • Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryptionwithout pairings. In: 48th FOCS, Providence, USA, pp. 647-657. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) 48th FOCS , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 7
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • In: Biham, E. (ed.). LNCS. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.2656, pp. 255-271. Springer, Heidelberg (2003)
    • (2003) EUROCRYPT 2003 , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 8
    • 38049112331 scopus 로고    scopus 로고
    • Simulatable vRFs with applications to multi-theorem NIZK
    • In: Menezes, A. (ed.). LNCS. Springer, Heidelberg
    • Chase, M., Lysyanskaya, A.: Simulatable vRFs with applications to multi-theorem NIZK. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 303-322. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007 , vol.4622 , pp. 303-322
    • Chase, M.1    Lysyanskaya, A.2
  • 10
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • In: Honary, B. (ed.). LNCS. Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001 , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 11
    • 84958742006 scopus 로고    scopus 로고
    • Efficient Construction of (Distributed) Verifiable Random Functions
    • Public Key Cryptography - PKC 2003
    • Dodis, Y.: Efficient construction of (Distributed) verifiable random functions. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.2567, pp. 1-17. Springer, Heidelberg (2002) (Pubitemid 36137124)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2567 , pp. 1-17
    • Dodis, Y.1
  • 13
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 15
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • Seattle, Washington, USA, May 15-17. ACM Press, New York
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, Seattle, Washington, USA, May 15-17, pp. 25-32. ACM Press, New York (1989)
    • (1989) 21st ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 16
    • 85008172715 scopus 로고
    • Invariant signatures and non-interactive zeroknowledge proofs are equivalent
    • In: Brickell, E.F. (ed.). LNCS. Springer, Heidelberg
    • Goldwasser, S., Ostrovsky, R.: Invariant signatures and non-interactive zeroknowledge proofs are equivalent. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 228-245. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1992 , vol.740 , pp. 228-245
    • Goldwasser, S.1    Ostrovsky, R.2
  • 17
    • 35048900318 scopus 로고    scopus 로고
    • Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
    • Advances in Cryptology - EUROCRYPT 2004
    • Jarecki, S., Shmatikov, V.: Handcuffing big brother: an abuse-resilient transaction escrow scheme. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 590-608. Springer, Heidelberg (2004) (Pubitemid 38717028)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3027 , pp. 590-608
    • Jarecki, S.1    Shmatikov, V.2
  • 19
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2) (1988)
    • (1988) SIAM Journal on Computing , vol.17 , pp. 2
    • Luby, M.1    Rackoff, C.2
  • 20
    • 84937425161 scopus 로고    scopus 로고
    • Unique signatures and verifiable random functions from the DHDDH separation
    • In: Yung, M. (ed.). LNCS. Springer, Heidelberg
    • Lysyanskaya, A.: Unique signatures and verifiable random functions from the DHDDH separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.2442, pp. 597-612. Springer, Heidelberg (2002)
    • (2002) CRYPTO 2002 , vol.2442 , pp. 597-612
    • Lysyanskaya, A.1
  • 22
    • 84880857867 scopus 로고    scopus 로고
    • Soundness in the Public-Key Model
    • Advances in Cryptology - CRYPTO 2001
    • Micali, S., Reyzin, L.: Soundness in the public-key model. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 542-565. Springer, Heidelberg (2001) (Pubitemid 33317936)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 542-565
    • Micali, S.1    Reyzin, L.2
  • 23
    • 84944900444 scopus 로고    scopus 로고
    • Micropayments revisited
    • In: Preneel, B. (ed.). LNCS. Springer, Heidelberg
    • Micali, S., Rivest, R.L.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.2271, pp. 149-163. Springer, Heidelberg (2002)
    • (2002) CT-RSA 2002 , vol.2271 , pp. 149-163
    • Micali, S.1    Rivest, R.L.2
  • 24
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Miami Beach, Florida, October 19-22. IEEE Computer Society Press, Los Alamitos
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, Miami Beach, Florida, October 19-22, pp. 458-467. IEEE Computer Society Press, Los Alamitos (1997)
    • (1997) 38th FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 26
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • In: Blakely, G.R., Chaum, D. (eds.). LNCS. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 27
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.