메뉴 건너뛰기




Volumn 20, Issue 10, 2009, Pages 2907-2914

Design and analysis of a provable secure multi-recipient public key encryption scheme

Author keywords

Elliptic curve; Multi recipient public key encryption; Secret sharing; Secure broadcasting

Indexed keywords

BILINEAR PAIRING; CIPHERTEXTS; DECRYPTION KEYS; DESIGN AND ANALYSIS; DIFFIE-HELLMAN ASSUMPTION; ELLIPTIC CURVE; ENCRYPTION KEY; IND-CCA2 SECURITY; KEY-DISTRIBUTION PROTOCOLS; MULTI-RECIPIENT PUBLIC KEY ENCRYPTION; OPEN NETWORK; PUBLIC-KEY ENCRYPTION SCHEME; SECRET SHARING; SENSITIVE INFORMATIONS; THRESHOLD SECRET SHARING;

EID: 70449723369     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2009.03552     Document Type: Article
Times cited : (18)

References (12)
  • 4
    • 84948957152 scopus 로고    scopus 로고
    • Public-Key encryption in a multi-user setting: Security proofs and improvements
    • Naor M.(ed.), LNCS 1807, Heidelberg: Springer-Verlag
    • Bellare M, Boldyreva A, Micali S. Public-Key encryption in a multi-user setting: Security proofs and improvements. In: Naor M, ed. Proc. of the Advances in Cryptology (Eurocrypt 2000). LNCS 1807, Heidelberg: Springer-Verlag, 2000. 259-274.
    • (2000) Proc. of the Advances in Cryptology (Eurocrypt 2000) , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 5
    • 84958971364 scopus 로고    scopus 로고
    • Multi-Recipient public-key encryption with shortened ciphertext
    • Naccache D. and Paillier P.(ed.), LNCS 2274, Heidelberg: Springer-Verlag
    • Kurosawa K. Multi-Recipient public-key encryption with shortened ciphertext. In: Naccache D, Paillier P, eds. Proc. of the 5th Int'l Workshop on Practice and Theory in Public Key Cryptography (PKC 2002). LNCS 2274, Heidelberg: Springer-Verlag, 2002. 48-63.
    • (2002) Proc. of the 5th Int'l Workshop on Practice and Theory in Public Key Cryptography (PKC 2002) , pp. 48-63
    • Kurosawa, K.1
  • 8
    • 33745758002 scopus 로고    scopus 로고
    • An efficient (t, n) threshold multi-secret sharing scheme
    • in Chinese with English abstract
    • Pang LJ, Liu Y, Wang YM. An efficient (t, n) threshold multi-secret sharing scheme. Acta Electronica Sinica, 2006, 34 (4): 587-589 (in Chinese with English abstract).
    • (2006) Acta Electronica Sinica , vol.34 , Issue.4 , pp. 587-589
    • Pang, L.J.1    Liu, Y.2    Wang, Y.M.3
  • 9
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • Naccache D.(ed.), LNCS 2020, Heidelberg: Springer-Verlag
    • Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D, ed. Proc. of the Cryptographer's Track at RSA Conference (CT-RSA 2001). LNCS 2020, Heidelberg: Springer-Verlag, 2001. 159-174.
    • (2001) Proc. of the Cryptographer's Track at RSA Conference (CT-RSA 2001) , pp. 159-174
    • Okamoto, T.1    Pointcheval, D.2
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based encryption from the Weil pairing
    • Kilian J.(ed.), LNCS 2139, Heidelberg: Springer-Verlag
    • Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. In: Kilian J, ed. Proc. of the Advances in Cryptology (CRYPTO 2001). LNCS 2139, Heidelberg: Springer-Verlag, 2001. 213-229.
    • (2001) Proc. of the Advances in Cryptology (CRYPTO 2001) , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM, 1979, 22 (11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.