메뉴 건너뛰기




Volumn 5735 LNCS, Issue , 2009, Pages 151-166

Efficient conditional proxy re-encryption with chosen-ciphertext security

Author keywords

Chosen ciphertext security; Conditional proxy re encryption; Random oracle

Indexed keywords

CHOSEN-CIPHERTEXT SECURITY; CONDITIONAL PROXY RE-ENCRYPTION; DELEGATORS; DIFFIE HELLMAN; RANDOM ORACLE; RANDOM ORACLE MODEL; RE-ENCRYPTION; SECURITY NOTION;

EID: 70350376239     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04474-8_13     Document Type: Conference Paper
Times cited : (85)

References (22)
  • 1
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 2
    • 70350384128 scopus 로고    scopus 로고
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS, The Internet Society (2005)
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS, The Internet Society (2005)
  • 3
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 40249113119 scopus 로고    scopus 로고
    • Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 360-379. Springer, Heidelberg (2008)
    • Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
  • 5
    • 58549086614 scopus 로고    scopus 로고
    • Type-based proxy re-encryption and its construction
    • Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
    • Tang, Q.: Type-based proxy re-encryption and its construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130-144. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 130-144
    • Tang, Q.1
  • 6
    • 77952320634 scopus 로고    scopus 로고
    • Weng, J., Deng, R.H., Ding, X., Chu, C.K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: ASIACCS, pp. 322-332 (2009)
    • Weng, J., Deng, R.H., Ding, X., Chu, C.K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: ASIACCS, pp. 322-332 (2009)
  • 8
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-Siphertext Cecure Proxy Re-Encryption
    • Ning, P, di Vimercati, S.D.C, Syverson, P.F, eds, ACM, New York
    • Canetti, R., Hohenberger, S.: Chosen-Siphertext Cecure Proxy Re-Encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM, New York (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 9
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing Chosen-Ciphertext Security
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing Chosen-Ciphertext Security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 10
    • 70350360258 scopus 로고    scopus 로고
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption, http://hal.inria.fr/inria-00339530/en/, This is the extended version of [4]
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption, http://hal.inria.fr/inria-00339530/en/, This is the extended version of [4]
  • 11
    • 58449122500 scopus 로고    scopus 로고
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 1-17. Springer, Heidelberg (2008)
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
  • 12
    • 67049100266 scopus 로고    scopus 로고
    • CCA-Secure Proxy Re-encryption without Pairings
    • Jarecki, S, Tsudik, G, eds, Public Key Cryptography, Springer, Heidelberg
    • Shao, J., Cao, Z.: CCA-Secure Proxy Re-encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 13
    • 77953491924 scopus 로고    scopus 로고
    • Efficient unidirectional proxy re-encryption. Cryptology ePrint Archive
    • Report 2009/189
    • Weng, J., Chow, S.S., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. Cryptology ePrint Archive, Report 2009/189 (2009), http://eprint.iacr.org/
    • (2009)
    • Weng, J.1    Chow, S.S.2    Yang, Y.3    Deng, R.H.4
  • 14
    • 52149099038 scopus 로고    scopus 로고
    • Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 332-353. Springer, Heidelberg (2008)
    • Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332-353. Springer, Heidelberg (2008)
  • 15
    • 50049099260 scopus 로고    scopus 로고
    • Matsuo, T.: Proxy Re-encryption Systems for Identity-Based Encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, 4575, pp. 247-267. Springer, Heidelberg (2007)
    • Matsuo, T.: Proxy Re-encryption Systems for Identity-Based Encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
  • 16
    • 38049061546 scopus 로고    scopus 로고
    • Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 288-306. Springer, Heidelberg (2007)
    • Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
  • 17
    • 38149038713 scopus 로고    scopus 로고
    • Chu, C.K., Tzeng, W.G.: Identity-Based Proxy Re-encryption Without Random Oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 189-202. Springer, Heidelberg (2007)
    • Chu, C.K., Tzeng, W.G.: Identity-Based Proxy Re-encryption Without Random Oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
  • 19
    • 70350364090 scopus 로고    scopus 로고
    • Weng, J., Deng, R.H., Liu, S., Chen, K., Lai, J., Wang, X.: Chosen-ciphertext secure proxy re-encryption without pairings. Cryptology ePrint Archive, Report 2008/509 (2008), http://eprint.iacr.org/, This is the full paper of [11]
    • Weng, J., Deng, R.H., Liu, S., Chen, K., Lai, J., Wang, X.: Chosen-ciphertext secure proxy re-encryption without pairings. Cryptology ePrint Archive, Report 2008/509 (2008), http://eprint.iacr.org/, This is the full paper of [11]
  • 20
    • 85032883059 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Gamal, T.E.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • Gamal, T.E.1
  • 21
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 22
    • 84921068281 scopus 로고    scopus 로고
    • On the Exact Security of Full Domain Hash
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Coron, J.S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.