메뉴 건너뛰기




Volumn , Issue , 2008, Pages 511-520

Multi-use unidirectional proxy re-signatures

Author keywords

Digital signatures; Multi use proxy re cryptography; Unidirectionality

Indexed keywords

COMPUTATIONALLY EFFICIENT; CRYPTOGRAPHIC PRIMITIVES; DIGITAL SIGNATURES; EFFICIENT CONSTRUCTION; MULTI-USE PROXY RE-CRYPTOGRAPHY; MULTIHOP; RANDOM ORACLE; RANDOM ORACLE MODEL; SECRET KEY; SECURITY DEFINITIONS; SECURITY MODEL; SECURITY PROOFS; SIGNATURE SCHEME; SIGNING KEY; THE STANDARD MODEL; UNIDIRECTIONALITY;

EID: 70349284612     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455835     Document Type: Conference Paper
Times cited : (88)

References (31)
  • 1
    • 38049027731 scopus 로고    scopus 로고
    • Perfect NIZK with Adaptive Soundness
    • M. Abe, S. Fehr. Perfect NIZK with Adaptive Soundness. In TCC, pp. 118 136, 2007.
    • (2007) TCC , vol.136 , pp. 118
    • Abe, M.1    Fehr, S.2
  • 2
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • J.-H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In EUROCRYPT, pp. 83 107, 2002.
    • (2002) EUROCRYPT , vol.107 , pp. 83
    • An, J.-H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 33745213464 scopus 로고    scopus 로고
    • Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
    • G. Atcniesc, K. Fu, M. Green, S. Hohenbcrgcr. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS, 2005.
    • (2005) NDSS
    • Atcniesc, G.1    Fu, K.2    Green, M.3    Hohenbcrgcr, S.4
  • 4
    • 33745218758 scopus 로고    scopus 로고
    • Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
    • G. Atcniese, K. Fir, M. Green, S. Hohenbcrgcr. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In ACM TISSEC, 9(1): pp. 1 30, 2006.
    • (2006) ACM TISSEC , vol.9 , Issue.1 , pp. 1-30
    • Atcniese, G.1    Fir, K.2    Green, M.3    Hohenbcrgcr, S.4
  • 5
    • 33745782314 scopus 로고    scopus 로고
    • Proxy re-signatures: New definitions, algorithms, and applications
    • G. Ateniese, S. Hohenberger. Proxy re-signatures: new definitions, algorithms, and applications. In ACM CCS'05, pp. 310 319, 2005.
    • (2005) ACM CCS'05 , pp. 310-319
    • Ateniese, G.1    Hohenberger, S.2
  • 6
    • 34547339273 scopus 로고    scopus 로고
    • Multi-signatures in the plain public-Key model and a general forking lemma
    • M. Bellare, G. Neven. Multi-signatures in the plain public-Key model and a general forking lemma. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Bellare, M.1    Neven, G.2
  • 7
    • 35048881545 scopus 로고    scopus 로고
    • The knowlcdgc-of-cxponcut assumptions and 3-round zero-knowledge protocols
    • M. Bellare. A. Palacio. The knowlcdgc-of-cxponcut assumptions and 3-round zero-knowledge protocols. In CRYPTO, pp. 273 289, 2004.
    • (2004) CRYPTO , vol.289 , pp. 273
    • Bellare, M.1    Palacio, A.2
  • 8
    • 35048836178 scopus 로고    scopus 로고
    • Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
    • M. Bellare, A. Palacio. Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. In ASIACRYPT, pp. 48 62, 2004.
    • (2004) ASIACRYPT , vol.62 , pp. 48
    • Bellare, M.1    Palacio, A.2
  • 9
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare. P. R,ogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, pp. 62 73, 1993.
    • (1993) ACM CCS , vol.73 , pp. 62
    • Bellare, M.1    ogaway, P.R.2
  • 10
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • M. Blaze, G. Bleumer, M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In EUROCRYPT, pp. 127 144. 1998.
    • (1998) EUROCRYPT , vol.144 , pp. 127
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 11
    • 0842304790 scopus 로고    scopus 로고
    • Efficient Threshold Signature. Multisignature and Blind Signature Schemes Based on the Gap-Difne-Hellnian-group Signature Scheme
    • A. Boldyreva. Efficient Threshold Signature. Multisignature and Blind Signature Schemes Based on the Gap-Difne-Hellnian-group Signature Scheme. In PKC, pp. 31 46, 2003.
    • (2003) PKC , vol.46 , pp. 31
    • Boldyreva, A.1
  • 12
    • 35048841300 scopus 로고    scopus 로고
    • Efficient sclcctivc-ID secure identity based encryption without random oracles
    • D. Bonch, X. Boyen. Efficient sclcctivc-ID secure identity based encryption without random oracles. In EUR.OCR.YPT, pp. 223 238, 2004.
    • (2004) EUR.OCR.YPT , pp. 223-238
    • Bonch, D.1    Boyen, X.2
  • 13
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, H. Shacham. Short signatures from the Weil pairing. In ASIACRYPT, pp. 514-532, 2002.
    • (2002) ASIACRYPT , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 14
    • 77952361637 scopus 로고    scopus 로고
    • Choscn-Ciphertcxt Secure Proxy Re-Encryption
    • R. Canctti, S. Hohenberger. Choscn-Ciphertcxt Secure Proxy Re-Encryption. In ACM CCS, pp. 185-194, 2007.
    • (2007) ACM CCS , pp. 185-194
    • Canctti, R.1    Hohenberger, S.2
  • 15
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of Full Domain Hash
    • J.-S. Coron. On the exact security of Full Domain Hash. In CRYPTO, pp. 229 235, 2000.
    • (2000) CRYPTO , vol.235 , pp. 229
    • Coron, J.-S.1
  • 16
    • 85029541173 scopus 로고
    • Towards Practical Public Key Systems Secure Against Chosen Ciphertcxt Attacks
    • I. Damgard: Towards Practical Public Key Systems Secure Against Chosen Ciphertcxt Attacks. In CRYPTO, pp. 445 456, 1991.
    • (1991) CRYPTO , vol.456 , pp. 445
    • Damgard, I.1
  • 18
    • 26844570979 scopus 로고    scopus 로고
    • Proxy Cryptography Revisited
    • Y. Dodis, A.-A. Ivan. Proxy Cryptography Revisited. In NDSS'OS, 2003.
    • (2003) NDSS'OS
    • Dodis, Y.1    Ivan, A.-A.2
  • 19
    • 33749564652 scopus 로고    scopus 로고
    • On Computing Products of Pairings. Cryptology ePrint Archive
    • Report 2006/172
    • R. Granger, N. P. Smart. On Computing Products of Pairings. Cryptology ePrint Archive: Report 2006/172, 2006.
    • (2006)
    • Granger, R.1    Smart, N.P.2
  • 20
    • 38049061546 scopus 로고    scopus 로고
    • Identity-Based Proxy Re-encryption
    • M. Green, G. Ateniese. Identity-Based Proxy Re-encryption. In ACNS, pp. 288 306, 2007.
    • (2007) ACNS , vol.306 , pp. 288
    • Green, M.1    Ateniese, G.2
  • 21
    • 70349276304 scopus 로고    scopus 로고
    • Advances in Signatures, Encryption, and E-Cash from Bilinear Groups
    • May
    • S. Hohenberger. Advances in Signatures, Encryption, and E-Cash from Bilinear Groups. Ph.D. Thesis, MIT, May 2006.
    • (2006) MIT
    • Hohenberger, S.1
  • 23
    • 33750015293 scopus 로고    scopus 로고
    • About the Security of MTI/C0 and MQV
    • S. Kunz-Jacqucs. D. Pointcheval. About the Security of MTI/C0 and MQV. In SCN, pp. 156-172, 2006.
    • (2006) SCN , pp. 156-172
    • Kunz-Jacqucs, S.1    Pointcheval, D.2
  • 24
    • 70349279525 scopus 로고    scopus 로고
    • Multi-Use Unidirectional Proxy Re-Signatures
    • Available from
    • B. Libert, D. Vergnaud. Multi-Use Unidirectional Proxy Re-Signatures. In Computing Research Repository. Available from http://arxiv.org/abs/0802. 1113.
    • Computing Research Repository
    • Libert, B.1    Vergnaud, D.2
  • 25
    • 33746066354 scopus 로고    scopus 로고
    • Sequential Aggregate Signatures and Multisignatures Without Random Oracles
    • S. Lu, R. Ostrovsky, A. Sahai, H. Shacharn, B. Waters. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In EUROCRYPT, pp. 465 485, 2006.
    • (2006) EUROCRYPT , vol.485 , pp. 465
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacharn, H.4    Waters, B.5
  • 26
    • 0029717329 scopus 로고    scopus 로고
    • Proxy Signatures for Delegating Signing Operation
    • M. Mambo, K. Usuda, E. Okamoto. Proxy Signatures for Delegating Signing Operation. In ACM CCS, pp. 48-57, 1996.
    • (1996) ACM CCS , pp. 48-57
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 27
    • 35248818856 scopus 로고    scopus 로고
    • On Cryptographic Assumptions and Challenges
    • M. Naor. On Cryptographic Assumptions and Challenges. In CRYPTO, pp. 96 109, 2003.
    • (2003) CRYPTO , vol.109 , pp. 96
    • Naor, M.1
  • 28
    • 78651384186 scopus 로고    scopus 로고
    • The Power of Proofs of Possession: Securing Multiparty Signatures Against Rogue Key Attacks
    • T. Ristenpart, S. Y'ilek. The Power of Proofs of Possession: Securing Multiparty Signatures Against Rogue Key Attacks. In EUROCRYPT, pp. 246-263, 2007.
    • (2007) EUROCRYPT , pp. 246-263
    • Ristenpart, T.1    Y'ilek, S.2
  • 29
    • 38349051240 scopus 로고    scopus 로고
    • Proxy Re-Signature Schemes without Random Oracles
    • J. Shao, Z. Cao, L. Wang, X. Liang. Proxy Re-Signature Schemes without Random Oracles. In INDOCRYPT, pp. 197-209, 2007.
    • (2007) INDOCRYPT , pp. 197-209
    • Shao, J.1    Cao, Z.2    Wang, L.3    Liang, X.4
  • 30
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO, pp. 239 252, 1989.
    • (1989) CRYPTO , vol.252 , pp. 239
    • Schnorr, C.P.1
  • 31
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • B. Waters. Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT, pp. 114 127, 2005.
    • (2005) EUROCRYPT , vol.127 , pp. 114
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.