메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 179-196

Group encryption: Non-interactive realization in the standard model

Author keywords

Anonymity; Group encryption; Provable security

Indexed keywords

AMOUNT OF INTERACTION; BUILDING BLOCKES; CIPHERTEXTS; ENCRYPTION SCHEMES; ENCRYPTION SYSTEM; GE SCHEME; GROUP MEMBERS; GROUP SIGNATURES; INTERACTIVE PROOFS; NON-INTERACTIVE; OPEN PROBLEMS; PROVABLE SECURITY; PUBLIC KEYS; RANDOM ORACLE; RANDOM ORACLE MODEL; THE STANDARD MODEL;

EID: 72449167369     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_11     Document Type: Conference Paper
Times cited : (58)

References (38)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 40249111589 scopus 로고    scopus 로고
    • Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 356-374. Springer, Heidelberg (2008)
    • Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
  • 3
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 5
    • 38049077890 scopus 로고    scopus 로고
    • Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: Security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 458-475. Springer, Heidelberg (2007)
    • Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: Security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 458-475. Springer, Heidelberg (2007)
  • 6
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 7
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003); Extended abstract in Crypto 2001, LNCS, 2139, pp. 213-229 (2001)
    • Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003); Extended abstract in Crypto 2001, LNCS, vol. 2139, pp. 213-229 (2001)
  • 9
    • 52149109136 scopus 로고    scopus 로고
    • Boyen, X., Delerablée, C.: Expressive subgroup signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 185-200. Springer, Heidelberg (2008)
    • Boyen, X., Delerablée, C.: Expressive subgroup signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 185-200. Springer, Heidelberg (2008)
  • 10
    • 37149007674 scopus 로고    scopus 로고
    • Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 1-15. Springer, Heidelberg (2007)
    • Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
  • 11
    • 67650691588 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Ghilardi, S, ed, EUROCRYPT 2009, Springer, Heidelberg
    • Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In: Ghilardi, S. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 351-368
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 12
    • 35248839965 scopus 로고    scopus 로고
    • Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
    • Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
  • 13
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 14
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 15
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 16
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 17
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 19
    • 84887276320 scopus 로고    scopus 로고
    • Dynamic fully anonymous short group signatures
    • Nguyên, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Delerablée, C., Pointcheval, D.: Dynamic fully anonymous short group signatures. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193-210. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 193-210
    • Delerablée, C.1    Pointcheval, D.2
  • 20
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 21
    • 69949127452 scopus 로고    scopus 로고
    • Fuchsbauer, G., Pointcheval, D.: Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity for Signatures. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, 5671, pp. 132-149. Springer, Heidelberg (2009)
    • Fuchsbauer, G., Pointcheval, D.: Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity for Signatures. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 132-149. Springer, Heidelberg (2009)
  • 22
    • 0344550529 scopus 로고    scopus 로고
    • On the (In)security of the Fiat-Shamir Paradig
    • Goldwasser, S., Tauman-Kalai, Y.: On the (In)security of the Fiat-Shamir Paradig. In: FOCS 2003, pp. 102-115 (2003)
    • (2003) FOCS 2003 , pp. 102-115
    • Goldwasser, S.1    Tauman-Kalai, Y.2
  • 23
    • 77649262306 scopus 로고    scopus 로고
    • Simulation-sound NIZK proofs for a practical language and constant size group signatures
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 444-459
    • Groth, J.1
  • 24
    • 38149097733 scopus 로고    scopus 로고
    • Fully anonymous group signatures without random oracles
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Groth, J.: Fully anonymous group signatures without random oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164-180. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 164-180
    • Groth, J.1
  • 25
    • 72449171321 scopus 로고    scopus 로고
    • Homomorphic trapdoor commitments to group elements. Cryptology ePrint Archive
    • Report 2009/007
    • Groth, J.: Homomorphic trapdoor commitments to group elements. Cryptology ePrint Archive: Report 2009/007 (2009)
    • (2009)
    • Groth, J.1
  • 26
    • 38149123353 scopus 로고    scopus 로고
    • A non-interactive shuffle with pairing based verifiability
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Groth, J., Lu, S.: A non-interactive shuffle with pairing based verifiability. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 51-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 51-67
    • Groth, J.1    Lu, S.2
  • 27
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 28
    • 33646764832 scopus 로고    scopus 로고
    • A Sufficient Condition for Key-Privacy. Cryptology ePrint Archive
    • Report 2005/005
    • Halevi, S.: A Sufficient Condition for Key-Privacy. Cryptology ePrint Archive: Report 2005/005 (2005)
    • (2005)
    • Halevi, S.1
  • 29
    • 38149056534 scopus 로고    scopus 로고
    • Group encryption
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Kiayias, A., Tsiounis, Y., Yung, M.: Group encryption. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 181-199. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 181-199
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 30
    • 24944524118 scopus 로고    scopus 로고
    • Group signatures with efficient concurrent join
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Kiayias, A., Yung, M.: Group signatures with efficient concurrent join. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 198-214. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 198-214
    • Kiayias, A.1    Yung, M.2
  • 31
    • 33745574075 scopus 로고    scopus 로고
    • Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 581-600. Springer, Heidelberg (2006)
    • Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
  • 32
    • 84959444946 scopus 로고    scopus 로고
    • Chameleon signatures
    • Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS 2000 (2000)
    • (2000) NDSS
    • Krawczyk, H.1    Rabin, T.2
  • 33
    • 33750015293 scopus 로고    scopus 로고
    • Kunz-Jacques, S., Pointcheval, D.: About the security of MTI/C0 and MQV. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 156-172. Springer, Heidelberg (2006)
    • Kunz-Jacques, S., Pointcheval, D.: About the security of MTI/C0 and MQV. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 156-172. Springer, Heidelberg (2006)
  • 34
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC 1989, pp. 33-43 (1989)
    • (1989) STOC 1989 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 35
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 36
    • 67650159583 scopus 로고    scopus 로고
    • Publicly Verifiable Privacy-Preserving Group Decryption
    • Moti, Y, Liu, P, Lin, D, eds, Inscrypt 2008, Springer, Heidelberg
    • Qin, B., Wu, Q., Susilo, W., Mu, Y., Wang, Y.: Publicly Verifiable Privacy-Preserving Group Decryption. In: Moti, Y., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 72-83. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5487 , pp. 72-83
    • Qin, B.1    Wu, Q.2    Susilo, W.3    Mu, Y.4    Wang, Y.5
  • 37
    • 72449129787 scopus 로고    scopus 로고
    • Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive: Report 2007/074 (2007)
    • Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive: Report 2007/074 (2007)
  • 38
    • 72449173635 scopus 로고    scopus 로고
    • Shoup, V, A proposal for the ISO standard for public-key encryption (version 2.1, manuscript 2001
    • Shoup, V.: A proposal for the ISO standard for public-key encryption (version 2.1). manuscript (2001), http://shoup.net/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.