메뉴 건너뛰기




Volumn , Issue , 2010, Pages 82-88

Identity-based encryption based on DHIES

Author keywords

bilinear map; combination; DHIES; identity based encryption

Indexed keywords

BILINEAR MAP; CHOSEN CIPHERTEXT ATTACK; CIPHERTEXTS; COMBINATION STRUCTURE; DIFFIE HELLMAN; ENCRYPTION SCHEMES; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; PRIVATE KEY; PUBLIC KEY CRYPTOSYSTEMS; PUBLIC KEY GENERATION; PUBLIC KEYS; RANDOM ORACLE MODEL; RICH STRUCTURE; SHORT SIGNATURES;

EID: 77954516750     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755699     Document Type: Conference Paper
Times cited : (4)

References (30)
  • 7
    • 33646770907 scopus 로고    scopus 로고
    • Theoretical analysis of xl over small fields
    • J.-M. C. Bo-Yin Yang. Theoretical analysis of xl over small fields. ACISP, 3108:277-288, 2004.
    • (2004) ACISP , vol.3108 , pp. 277-288
    • Yang, J.-M.C.B.-Y.1
  • 9
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. SIAM J. of Computing, 32:586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 23
    • 84974628135 scopus 로고    scopus 로고
    • The xtr public key system
    • A. K. Lenstra and E. R. Verheul. The xtr public key system. CRYPTO 2000, 1880:1-19, 2000.
    • (2000) CRYPTO 2000 , vol.1880 , pp. 1-19
    • Lenstra, A.K.1    Verheul, E.R.2
  • 24
    • 0022720533 scopus 로고
    • Gaussian elimination is optimal for solving linear equations in dimension two
    • T. Lickteig. Gaussian elimination is optimal for solving linear equations in dimension two. Inf. Process. Lett., 22(6):277-279, 1986.
    • (1986) Inf. Process. Lett. , vol.22 , Issue.6 , pp. 277-279
    • Lickteig, T.1
  • 25
    • 3042553102 scopus 로고
    • Non-interactive public-key cryptography
    • U. M. Maurer and Y. Yacobi. Non-interactive public-key cryptography. EUROCRYPT 1991, 547:498-507, 1991.
    • (1991) EUROCRYPT 1991 , vol.547 , pp. 498-507
    • Maurer, U.M.1    Yacobi, Y.2
  • 26
    • 77954531503 scopus 로고    scopus 로고
    • MIRACL
    • MIRACL. http://www.shamus.ie/.
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • February
    • A. S. R. Rivest and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, A.S.R.1    Adleman, L.2
  • 28
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signatures schemes
    • A. Shamir. Identity-based cryptosystems and signatures schemes. Advances in Cryptology - Crypto 1984, 196:47-53, 1984.
    • (1984) Advances in Cryptology - Crypto 1984 , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.