메뉴 건너뛰기




Volumn 21, Issue 4, 2010, Pages 257-284

Extensions of access structures and their cryptographic applications

Author keywords

Attribute based encryption; Dynamic distributed encryption; Secret sharing

Indexed keywords

A-MONOTONE; ACCESS STRUCTURE; ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHIC APPLICATIONS; CRYPTOGRAPHIC PROTOCOLS; ENCRYPTION SCHEMES; EXPLICIT CONSTRUCTIONS; MINIMAL SUBSET; SECRET SHARING; SECRET SHARING SCHEMES; VECTOR SPACE ACCESS STRUCTURES;

EID: 77955694020     PISSN: 09381279     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00200-010-0125-1     Document Type: Article
Times cited : (10)

References (27)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • American Federation of Information, Processing Societies Proceedings
    • Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, American Federation of Information, Processing Societies Proceedings, vol.48, pp. 313-317 (1979)
    • (1979) Proceedings of the National Computer Conference , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 3
    • 38149050474 scopus 로고    scopus 로고
    • CCA2-secure threshold broadcast encryption with shorter ciphertexts
    • Proceedings of ProvSec'07, Springer
    • Daza, V., Herranz, J., Morillo, P., Ràfols, C.: CCA2-secure threshold broadcast encryption with shorter ciphertexts. In: Proceedings of ProvSec'07, LNCS, vol.4784, pp. 35-50. Springer (2007)
    • (2007) LNCS , vol.4784 , pp. 35-50
    • Daza, V.1    Herranz, J.2    Morillo, P.3    Ràfols, C.4
  • 4
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • available at
    • Waters B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Manuscript available at http://eprint.iacr.org/2008/290 (2008)
    • (2008) Manuscript
    • Waters, B.1
  • 5
  • 6
    • 38049036249 scopus 로고    scopus 로고
    • On secret sharing schemes, matroids and polymatroids
    • Proceedings of TCC'07, Springer
    • Martí-Farré, J., Padró, C.: On secret sharing schemes, matroids and polymatroids. In: Proceedings of TCC'07, LNCS, vol.4392, pp. 273-290. Springer (2007)
    • (2007) LNCS , vol.4392 , pp. 273-290
    • Martí-Farré, J.1    Padró, C.2
  • 7
    • 84898132112 scopus 로고
    • How to (really) share a secret
    • Proceedings of Crypto'88, Springer
    • Simmons, G.J.: How to (really) share a secret. In: Proceedings of Crypto'88, LNCS, vol.403, pp. 390-448. Springer (1990)
    • (1990) LNCS , vol.403 , pp. 390-448
    • Simmons, G.J.1
  • 8
    • 33947522725 scopus 로고    scopus 로고
    • Hierarchical threshold secret sharing
    • Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237-264 (2007)
    • (2007) J. Cryptol. , vol.20 , Issue.2 , pp. 237-264
    • Tassa, T.1
  • 9
    • 64249091460 scopus 로고    scopus 로고
    • Multipartite secret sharing by bivariate interpolation
    • Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22(2), 227-258 (2009)
    • (2009) J. Cryptol. , vol.22 , Issue.2 , pp. 227-258
    • Tassa, T.1    Dyn, N.2
  • 10
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inf. Theory 46(7), 2596-2604 (2000)
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.7 , pp. 2596-2604
    • Padró, C.1    Sáez, G.2
  • 11
    • 61849155741 scopus 로고    scopus 로고
    • Characterizing ideal weighted threshold secret sharing
    • Beimel, A., Tassa, T., Weinreb, E.: Characterizing ideal weighted threshold secret sharing. SIAM J. Discrete Math. 22(1), 360-397 (2008)
    • (2008) SIAM J. Discrete Math. , vol.22 , Issue.1 , pp. 360-397
    • Beimel, A.1    Tassa, T.2    Weinreb, E.3
  • 12
    • 84957712291 scopus 로고    scopus 로고
    • An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
    • Proceedings of Eurocrypt'99, Springer
    • Canetti, R., Goldwasser, S.: An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In: Proceedings of Eurocrypt'99, LNCS, vol.1592, pp. 90-106. Springer (1999)
    • (1999) LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 13
    • 33745655389 scopus 로고    scopus 로고
    • Chosen ciphertext secure public key threshold encryption without random oracles
    • Proceedings of CT-RSA'06, Springer
    • Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Proceedings of CT-RSA'06, LNCS, vol.3860, pp. 226-243. Springer (2006)
    • (2006) LNCS , vol.3860 , pp. 226-243
    • Boneh, D.1    Boyen, X.2    Halevi, S.3
  • 14
    • 38149069864 scopus 로고    scopus 로고
    • Dynamic threshold cryptosystems: A new scheme in group oriented cryptography
    • CTU Publishing house
    • Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Dynamic threshold cryptosystems: a new scheme in group oriented cryptography. In: Proceedings of Pragocrypt'96, CTU Publishing house, pp. 370-379 (1996)
    • (1996) Proceedings of Pragocrypt'96 , pp. 370-379
    • Ghodosi, H.1    Pieprzyk, J.2    Safavi-Naini, R.3
  • 15
    • 84979073196 scopus 로고    scopus 로고
    • Directed signatures and application to threshold cryptosystems
    • Proceedings of Security Protocols Workshop'96, Springer
    • Lim, C.H., Lee, P.J.: Directed signatures and application to threshold cryptosystems. In: Proceedings of Security Protocols Workshop'96, LNCS, vol.1189, pp. 131-138. Springer (1997)
    • (1997) LNCS , vol.1189 , pp. 131-138
    • Lim, C.H.1    Lee, P.J.2
  • 16
    • 33845571027 scopus 로고    scopus 로고
    • Efficient ID-based broadcast threshold decryption in ad hoc network
    • IEEE Computer Society
    • Chai, Z., Cao, Z., Zhou, Y.: Efficient ID-based broadcast threshold decryption in ad hoc network. In: Proceedings of IMSCCS'06, vol.2, IEEE Computer Society, pp. 148-154 (2006)
    • (2006) Proceedings of IMSCCS'06 , vol.2 , pp. 148-154
    • Chai, Z.1    Cao, Z.2    Zhou, Y.3
  • 17
    • 51849088550 scopus 로고    scopus 로고
    • Dynamic threshold public-key encryption
    • Proceedings of Crypto'08, Springer
    • Delerablée, C., Pointcheval, D.: Dynamic threshold public-key encryption. In: Proceedings of Crypto'08, LNCS, vol.5157, pp. 317-334. Springer (2008)
    • (2008) LNCS , vol.5157 , pp. 317-334
    • Delerablée, C.1    Pointcheval, D.2
  • 18
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469-472 (1985)
    • (1985) IEEE Trans. Inf. Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 19
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Proceedings of Eurocrypt'04, Springer
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of Eurocrypt'04, LNCS, vol.3027, pp. 223-238. Springer (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 20
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Proceedings of Eurocrypt'04, Springer
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Proceedings of Eurocrypt'04, LNCS, vol.3027, pp. 207-222. Springer (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Proceedings of Eurocrypt'05, Springer
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt'05, LNCS, vol.3494, pp. 457-473. Springer (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 26
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Proceedings of Eurocrypt'05, Springer
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Eurocrypt'05, LNCS, vol.3494, pp. 440-456. Springer (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.