메뉴 건너뛰기




Volumn 6122 LNCS, Issue , 2010, Pages 77-87

Fuzzy biometric signcryption scheme with bilinear pairings in the standard model

Author keywords

Biometric cryptographic; signcryption; standard model; threshold secret sharing

Indexed keywords

BILINEAR PAIRING; CHOSEN CIPHERTEXT ATTACK; CHOSEN MESSAGE ATTACKS; CRYPTOGRAPHIC PRIMITIVES; PRIVATE KEY; SCHEME MODELS; SECURITY DEFINITIONS; SIGNCRYPTION; SIGNCRYPTION SCHEMES; STANDARD MODEL; THE STANDARD MODEL; THRESHOLD SECRET SHARING;

EID: 77954654814     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13601-6_10     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 2
    • 38149009170 scopus 로고    scopus 로고
    • Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
    • Boneh, D., Boyen, X.: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. Journal of Cryptology 21, 149-177 (2008)
    • (2008) Journal of Cryptology , vol.21 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 5
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 6
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 7
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan, C.H.: A new signature scheme without random oracles. International Journal of Security and Networks 1(3-4), 237-242 (2006)
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.H.1
  • 8
    • 62649173578 scopus 로고    scopus 로고
    • Fully CCA2 secure identity based broadcast encryption without random oracles
    • Ren, Y., Gu, D.: Fully CCA2 secure identity based broadcast encryption without random oracles. Information Processing Letters 109, 527-533 (2009)
    • (2009) Information Processing Letters , vol.109 , pp. 527-533
    • Ren, Y.1    Gu, D.2
  • 9
    • 54349101206 scopus 로고    scopus 로고
    • Identity based signcryption scheme without random oracles
    • Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1), 56-62 (2009)
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 56-62
    • Yu, Y.1    Yang, B.2    Sun, Y.3    Zhu, S.4
  • 10
    • 70449102675 scopus 로고    scopus 로고
    • Certificateless signcryption scheme in the standard model
    • Liu, Z., Hu, Y., Zhang, X., Ma, H.: Certificateless signcryption scheme in the standard model. Information Sciences 180(3), 452-464 (2010)
    • (2010) Information Sciences , vol.180 , Issue.3 , pp. 452-464
    • Liu, Z.1    Hu, Y.2    Zhang, X.3    Ma, H.4
  • 11
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 12
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 14
    • 34748851940 scopus 로고    scopus 로고
    • New construction of fuzzy identity-based encryption
    • ACM, New York
    • Beak, J., Susilo, W., Zhou, J.: New construction of fuzzy identity-based encryption. In: ASIACCS'07, pp. 368-370. ACM, New York (2007)
    • (2007) ASIACCS'07 , pp. 368-370
    • Beak, J.1    Susilo, W.2    Zhou, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.