메뉴 건너뛰기




Volumn 6110 LNCS, Issue , 2010, Pages 92-112

Secure obfuscation for encrypted signatures

Author keywords

bilinear map; encrypted signatures; Obfuscation; signcryption

Indexed keywords

BILINEAR MAP; BLACK BOXES; CIPHERTEXTS; ENCRYPTION KEY; ENCRYPTION SCHEMES; OPEN PROBLEMS; PUBLIC KEYS; RE-ENCRYPTION; SEQUENTIAL COMPOSITIONS; SIGNATURE SCHEME; SIGNCRYPTION; SIGNING KEY; THE STANDARD MODEL;

EID: 77954654489     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13190-5_5     Document Type: Conference Paper
Times cited : (45)

References (35)
  • 1
    • 38049032820 scopus 로고    scopus 로고
    • How to shuffle in public
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Adida, B., Wikstrom, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 555-574
    • Adida, B.1    Wikstrom, D.2
  • 2
    • 84947237328 scopus 로고    scopus 로고
    • On the Security of Joint Signature and Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • An, J.H., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83-107. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg ECCC, Report No. 57
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001); ECCC, Report No. 57
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003)
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 0842305659 scopus 로고    scopus 로고
    • Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Canetti, R.: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 455-469. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 455-469
    • Canetti, R.1
  • 10
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing Chosen-Ciphertext Security
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing Chosen-Ciphertext Security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 12
    • 70350657206 scopus 로고    scopus 로고
    • Non-malleable Obfuscation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Canetti, R., Varia, M.: Non-malleable Obfuscation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 73-90. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 73-90
    • Canetti, R.1    Varia, M.2
  • 13
    • 0010252194 scopus 로고
    • Undeniable Signatures
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 14
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(11), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.11 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 15
    • 84958742006 scopus 로고    scopus 로고
    • Efficient Construction of (Distributed) Verifiable Random Functions
    • Naccache, D., Paillier, P. (eds.) PKC 2002. Springer, Heidelberg
    • Dodis, Y.: Efficient Construction of (Distributed) Verifiable Random Functions. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 1-17. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2274 , pp. 1-17
    • Dodis, Y.1
  • 17
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469-472 (1985)
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 20
    • 33748600953 scopus 로고    scopus 로고
    • On the Impossibility of Obfuscation with Auxiliary Input
    • Goldwasser, S., Kalai, Y.T.: On the Impossibility of Obfuscation with Auxiliary Input. In: Proceedings of FOCS 2005, pp. 553-562 (2005)
    • (2005) Proceedings of FOCS 2005 , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 21
    • 38049015775 scopus 로고    scopus 로고
    • On Best-Possible Obfuscation
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Goldwasser, S., Rothblum, G.N.: On Best-Possible Obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 194-213
    • Goldwasser, S.1    Rothblum, G.N.2
  • 22
    • 84937414062 scopus 로고    scopus 로고
    • Zero-Knowledge and Code Obfuscation
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Hada, S.: Zero-Knowledge and Code Obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 443-457
    • Hada, S.1
  • 23
    • 38049056625 scopus 로고    scopus 로고
    • Obfuscation for Cryptographic Purposes
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for Cryptographic Purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 214-232
    • Hofheinz, D.1    Malone-Lee, J.2    Stam, M.3
  • 24
    • 38049073133 scopus 로고    scopus 로고
    • Securely Obfuscating Re-Encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Re-Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 25
    • 84958550160 scopus 로고    scopus 로고
    • The Weil and Tate pairings as building blocks for public key cryptosystems
    • Fieker, C., Kohel, D.R. (eds.) ANTS 2002. Springer, Heidelberg
    • Joux, A.: The Weil and Tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20-32. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2369 , pp. 20-32
    • Joux, A.1
  • 26
    • 21144454271 scopus 로고    scopus 로고
    • Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
    • DOI 10.1007/s00145-003-0052-4
    • Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffie-Hellman in Cryptographic Groups. Journal of Cryptology 16(4), 239-247 (2003) (Pubitemid 40877275)
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 27
    • 35048895442 scopus 로고    scopus 로고
    • Positive Results and Techniques for Obfuscation
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Lynn, B., Prabhakaran, M., Sahai, A.: Positive Results and Techniques for Obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 28
    • 84937425161 scopus 로고    scopus 로고
    • Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Lysyanskaya, A.: Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 597. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 597
    • Lysyanskaya, A.1
  • 29
    • 4243054954 scopus 로고    scopus 로고
    • Number-Theoretic Constructions of Efficient Pseudo-Random Functions
    • Naor, M., Reingold, O.: Number-Theoretic Constructions of Efficient Pseudo-Random Functions. Journal of the ACM 51(2), 231-262 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 30
    • 33745177806 scopus 로고    scopus 로고
    • Private searching on streaming data
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Ostrovsky, R., Skeith III, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223-240. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 223-240
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 31
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 32
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 161-174 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 33
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 34
    • 33745541383 scopus 로고    scopus 로고
    • On Obfuscating Point Functions
    • Wee, H.: On Obfuscating Point Functions. In: Proceedings of STOC 2005, pp. 523-532 (2005)
    • (2005) Proceedings of STOC 2005 , pp. 523-532
    • Wee, H.1
  • 35
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.