메뉴 건너뛰기




Volumn 180, Issue 13, 2010, Pages 2618-2632

Secure threshold multi authority attribute based encryption without a central authority

Author keywords

Threshold multi authority ABE; Without a central authority

Indexed keywords

ADVERSARY MODELS; ATTRIBUTE AUTHORITY; CIPHERTEXTS; CRYPTOGRAPHIC PRIMITIVES; DIFFIE-HELLMAN ASSUMPTION; DISTRIBUTED KEY GENERATION PROTOCOLS; ENCRYPTION SCHEMES; IDENTITY BASED ENCRYPTION; SECRET KEY; SECRET SHARING PROTOCOLS; SECURITY PROOFS; WHOLE SYSTEMS;

EID: 77950867637     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.03.004     Document Type: Article
Times cited : (101)

References (22)
  • 2
    • 55949088433 scopus 로고    scopus 로고
    • A secure identity-based proxy multi-signature scheme
    • Cao F., and Cao Z. A secure identity-based proxy multi-signature scheme. Inform. Sci. 179 3 (2009) 292-302
    • (2009) Inform. Sci. , vol.179 , Issue.3 , pp. 292-302
    • Cao, F.1    Cao, Z.2
  • 6
    • 84947926543 scopus 로고    scopus 로고
    • R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures, in: EUROCRYPT, 1996, pp. 354-371.
    • R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures, in: EUROCRYPT, 1996, pp. 354-371.
  • 8
    • 33846862213 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Gennaro R., Jarecki S., Krawczyk H., and Rabin T. Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20 1 (2007) 51-83
    • (2007) J. Cryptol. , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 9
    • 49049111604 scopus 로고    scopus 로고
    • V. Goyal, A.J. 0002, O. Pandey, A. Sahai, Bounded ciphertext policy attribute based encryption, in: ICALP, 2, 2008, pp. 579-591.
    • V. Goyal, A.J. 0002, O. Pandey, A. Sahai, Bounded ciphertext policy attribute based encryption, in: ICALP, vol. 2, 2008, pp. 579-591.
  • 12
    • 84957626176 scopus 로고    scopus 로고
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, in: CRYPTO, 1995, pp. 339-352.
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, in: CRYPTO, 1995, pp. 339-352.
  • 13
    • 70349739567 scopus 로고    scopus 로고
    • A forward-secure e-mail protocol without certificated public keys
    • Kwon J.O., Jeong I.R., and Lee D.H. A forward-secure e-mail protocol without certificated public keys. Inform. Sci. 179 24 (2009) 4227-4231
    • (2009) Inform. Sci. , vol.179 , Issue.24 , pp. 4227-4231
    • Kwon, J.O.1    Jeong, I.R.2    Lee, D.H.3
  • 14
    • 0027580298 scopus 로고
    • Efficient and secure multiparty generation of digital signatures based on discrete logarithms
    • M. Cerecedo, T. Matsumoto, H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, in: IEICE Transactions on Fundamentals, 1993, pp. 532-545.
    • (1993) IEICE Transactions on Fundamentals , pp. 532-545
    • Cerecedo, M.1    Matsumoto, T.2    Imai, H.3
  • 15
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inform. Sci. 177 6 (2007) 1364-1375
    • (2007) Inform. Sci. , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 18
    • 84957689308 scopus 로고    scopus 로고
    • T. Rabin, A simplified approach to threshold and proactive rsa, in: CRYPTO, 1998, pp. 89-104.
    • T. Rabin, A simplified approach to threshold and proactive rsa, in: CRYPTO, 1998, pp. 89-104.
  • 19
    • 24944554962 scopus 로고    scopus 로고
    • A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2005, pp. 457-473.
    • A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2005, pp. 457-473.
  • 20
    • 85020598353 scopus 로고    scopus 로고
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: CRYPTO, 1984, pp. 47-53.
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: CRYPTO, 1984, pp. 47-53.
  • 21
    • 55949109421 scopus 로고    scopus 로고
    • An improved identity-based key agreement protocol and its security proof
    • Wang S., Cao Z., Choo K.-K.R., and Wang L. An improved identity-based key agreement protocol and its security proof. Inform. Sci. 179 3 (2009) 307-318
    • (2009) Inform. Sci. , vol.179 , Issue.3 , pp. 307-318
    • Wang, S.1    Cao, Z.2    Choo, K.-K.R.3    Wang, L.4
  • 22
    • 35948963685 scopus 로고    scopus 로고
    • A novel id-based designated verifier signature scheme
    • Zhang J., and Mao J. A novel id-based designated verifier signature scheme. Inform. Sci. 178 3 (2008) 766-773
    • (2008) Inform. Sci. , vol.178 , Issue.3 , pp. 766-773
    • Zhang, J.1    Mao, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.