메뉴 건너뛰기




Volumn , Issue , 2008, Pages 59-66

RSA-TBOS signcryption with proxy re-encryption

Author keywords

Security; Theory

Indexed keywords

BILINEAR MAP; DIGITAL RIGHTS MANAGEMENT; IND-CCA2 SECURITY; NON-REPUDIABILITY; NON-REPUDIATION; OPEN PROBLEMS; RE-ENCRYPTION; SECURITY; SECURITY NOTION; SIGNCRYPTION; SIGNCRYPTION SCHEMES; THEORY; UNFORGEABILITY;

EID: 70349254785     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456520.1456531     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 1
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • Feb
    • R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2): pages 120-126. Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology, Proceedings of EUROCRYPT, of
    • M. Blaze, G. Bleumer and M. Strauss, Divertible protocols and atomic proxy cryptography. In Advances in Cryptology - Proceedings of EUROCRYPT 1998, volume 1403 of Lecture Notes in Computer Science, pages 127-144, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 3
    • 79961049494 scopus 로고    scopus 로고
    • From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
    • Eighth International Conference on Information and Communications Security ICICS '06, of, December
    • H. Khurana, J. Heo and M. Pant, From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution, Eighth International Conference on Information and Communications Security (ICICS '06), volume 4307 of Lecture Notes in Computer Science, pages 260-281, December 2006.
    • (2006) Lecture Notes in Computer Science , vol.4307 , pp. 260-281
    • Khurana, H.1    Heo, J.2    Pant, M.3
  • 5
    • 24144498013 scopus 로고    scopus 로고
    • L. Chen, J. Malone-Lee, Improved Identity-Based Signcryption, Public Key Cryptography 2005 (PKC 2005), 3386 of Lecture Notes in Computer Science, pages 362-379, Springer-Verlag, 2005.
    • L. Chen, J. Malone-Lee, Improved Identity-Based Signcryption, Public Key Cryptography 2005 (PKC 2005), volume 3386 of Lecture Notes in Computer Science, pages 362-379, Springer-Verlag, 2005.
  • 6
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost(Signature) + Cost(Encryption)
    • Advances in Cryptology, Proceedings of CRYPTO, of, Springer-Verlag
    • Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost(Signature) + Cost(Encryption). In Advances in Cryptology - Proceedings of CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag,1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 8
    • 84958982846 scopus 로고    scopus 로고
    • J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Public Key Cryptography 2002 (PKC 2002), 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
    • J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Public Key Cryptography 2002 (PKC 2002), volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
  • 9
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Advances in Cryptology, CRYPTO, of, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology - CRYPTO 1998, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 11
    • 84947237328 scopus 로고    scopus 로고
    • On the Security of Joint Signature and Encryption
    • Advances in Cryptology, EUROCRYPT, of, Springer-Verlag
    • J.H. An, Y. Dodis and T. Rabin, On the Security of Joint Signature and Encryption, In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 12
    • 70349247491 scopus 로고    scopus 로고
    • Unidirection, and CCA Security, Unpublished report available at Cryptology ePrint Archive
    • J. Shao, D. Xing and Z. Cao, Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security . Unpublished report available at Cryptology ePrint Archive: http://eprint.iacr.org/2008/103.pdf.
    • Identity-Based Proxy Re-encryption Schemes with Multiuse
    • Shao, J.1    Xing, D.2    Cao, Z.3
  • 13
    • 70349250773 scopus 로고    scopus 로고
    • M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In Applied Cryptography and Network Security 2007 (ACNS'07). Also available at Cryptology ePrint Archive: http://eprint.iacr.org/2007/473.pdf.
    • M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In Applied Cryptography and Network Security 2007 (ACNS'07). Also available at Cryptology ePrint Archive: http://eprint.iacr.org/2007/473.pdf.
  • 14
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly Verfiable by Public Key
    • Proceedings of Public Key Cryptography 1998 PKC '98, 1431 of, Springer Verlag
    • F. Bao and R.H. Deng, A signcryption scheme with signature directly Verfiable by Public Key. In Proceedings of Public Key Cryptography 1998 (PKC '98), volume 1431 of Lecture Notes in Computer Science, pages 55-59, Springer Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 16
    • 70349255332 scopus 로고    scopus 로고
    • A. Ivan and Y. Dodis, Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003), San Diego, California, USA.
    • A. Ivan and Y. Dodis, Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003), San Diego, California, USA.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.