메뉴 건너뛰기




Volumn , Issue , 2008, Pages 381-388

Stateful identity-based encryption scheme: Faster encryption and decryption

Author keywords

Cryptography; IBE; Provable security; ROM; Stateful encryption

Indexed keywords

ENCRYPTION AND DECRYPTION; IBE; IDENTITY BASED ENCRYPTION; PROVABLE SECURITY; RANDOM ORACLE MODEL; SECURITY DEFINITIONS;

EID: 70449717772     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368367     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 1
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Springer-Verlag
    • D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, " EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 223-238, 2004.
    • (2004) EUROCRYPT 2004, LNCS 3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 2
    • 34547313805 scopus 로고    scopus 로고
    • Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation
    • Full version available at
    • M. Bellare, T. Kohno, and V. Shoup, "Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation, " ACM CCS 2006. Full version available at http://eprint.iacr.org/2006/267.
    • ACM CCS 2006
    • Bellare, M.1    Kohno, T.2    Shoup, V.3
  • 3
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • 2000
    • M. Bellare, C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, " ASIACRYPT 2000, pp. 531-545, 2000.
    • (2000) ASIACRYPT , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing, " SIAM J. of Compt., Vol. 32, No. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Compt. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Springer-Verlag
    • J. S. Coron, "On the exact security of Full Domain Hash", Proceedings of Crypto 2000, LNCS vol. 1880, Springer-Verlag, pp. 229-235, 2000.
    • (2000) Proceedings of Crypto 2000, LNCS , vol.1880 , pp. 229-235
    • Coron, J.S.1
  • 7
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Springer-Verlag
    • R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme, " Eurocrypt 2003, LNCS Vol. 2656, Springer-Verlag, pp. 255-271, 2003.
    • (2003) Eurocrypt 2003, LNCS , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 8
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer, V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, " SIAM J. of Comt., Vol. 33, pp. 167-226, 2003.
    • (2003) SIAM J. of Comt. , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 9
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer-Verlag
    • E. Fujisaki, T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", Proc. of Crypto '99, LNCS 1666, Springer-Verlag, pp. 537-554, 1999.
    • (1999) Proc. of Crypto '99, LNCS 1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 10
    • 26444618568 scopus 로고    scopus 로고
    • Boneh-franklin identity based encryption revisited
    • Full version available from the author's homepage
    • D. Galindo, "Boneh-Franklin Identity Based Encryption Revisited, " In ICALP'05, LNCS 3580, pp. 791-802, 2005. Full version available from the author's homepage: http://www.cs.ru.nl/dgalindo/ICALP2005fullpdf.
    • (2005) ICALP'05, LNCS 3580 , pp. 791-802
    • Galindo, D.1
  • 11
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • K. Kurosawa and Y. Desmedt, "A New Paradigm of Hybrid Encryption Scheme, " CRYPTO 2004, pp. 426-442, 2004.
    • (2004) CRYPTO 2004 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 12
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • V. Shoup, "Using hash functions as a hedge against chosen ciphertext attack, " Eurocrypt'00, pp. 275-288, 2000.
    • (2000) Eurocrypt'00 , pp. 275-288
    • Shoup, V.1
  • 13
    • 77952378030 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Available from
    • V. Shoup, "Sequences of games: a tool for taming complexity in security proofs, " manuscript, 2006. Available from http://www.shoup. net/papers/.
    • (2006) Manuscript
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.