메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A new identity based encryption scheme

Author keywords

Identity based encryption; Security proof

Indexed keywords

CHOSEN-PLAINTEXT ATTACK; GROUP-BASED; IDENTITY BASED ENCRYPTION; IDENTITY BASED ENCRYPTION SCHEMES; NOVEL TECHNIQUES; THE STANDARD MODEL; CIPHERTEXTS; IDENTITY-BASED; RE-ENCRYPTION; TRUSTED PARTY;

EID: 77953302604     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICBECS.2010.5462447     Document Type: Conference Paper
Times cited : (12)

References (9)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • CRYPTO 2001
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. In CRYPTO 2001, volume 2139 of LNCS, pages 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • EUROCRYPT 2004
    • D. Boneh and X.Boyen. Efficient selective-id secure identity based encryption without random oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223-238, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without rando oracles
    • CRYPTO 2004
    • D. Boneh and X.Boyen. Secure identity based encryption without rando oracles. In CRYPTO 2004, volume 3152 of LNCS, pages 443-459, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 4
    • 67650159910 scopus 로고    scopus 로고
    • A tapestry of identity-based encryption: Practical frameworks compared
    • X. Boyen. A tapestry of identity-based encryption: practical frameworks compared, International Journal of Applied Cryptography, Vol.1, No.1, pp. 3-20.
    • International Journal of Applied Cryptography , vol.1 , Issue.1 , pp. 3-20
    • Boyen, X.1
  • 5
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • EUROCRYPT 2006
    • C. Gentry. Practical identity-based encryption without random oracles. In EUROCRYPT 2006, volume 4004 of LNCS, pages 445-464, 2006.
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 6
    • 35248818856 scopus 로고    scopus 로고
    • On cryptographic assumptions and challenges
    • CRYPTO 2003
    • M. Naor. On cryptographic assumptions and challenges. In CRYPTO 2003, volume 2729 of LNCS, pages 96-109, 2003.
    • (2003) LNCS , vol.2729 , pp. 96-109
    • Naor, M.1
  • 7
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve
    • R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive: http://eprint.iacr.org/2003/054.pdf.
    • Cryptology EPrint Archive
    • Sakai, R.1    Kasahara, M.2
  • 8
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature Schemes
    • CRYPTO 1984
    • A. Shamir. Identity-based cryptosystems and signature Schemes. In CRYPTO 1984, volume 196 of LNCS, pages 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 9
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • EUROCRYPT 2005
    • B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.