메뉴 건너뛰기




Volumn E93-A, Issue 9, 2010, Pages 1620-1631

A Hidden Vector Encryption scheme with constant-size tokens and pairing computations

Author keywords

Bilinear maps; Hidden vector encryption; Searchable public key encryption

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; VECTORS;

EID: 77956490316     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E93.A.1620     Document Type: Article
Times cited : (8)

References (25)
  • 3
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," TCC'07, vol. 4392, pp.535-554, 2007.
    • (2007) TCC'07 , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 4
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," EU- ROCRYPT'08, vol. 4965, pp.146-162, 2008.
    • (2008) EU- ROCRYPT'08 , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 5
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capabilites in predicate encryption systems
    • E. Shi and B. Waters, "Delegating capabilites in predicate encryption systems," ICALP'08, vol. 5126, pp.560-578, 2008.
    • (2008) ICALP'08 , vol.5126 , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 6
    • 52149090559 scopus 로고    scopus 로고
    • Hidden-vector encryption with groups of prime order
    • V. Iovino and G. Persiano, "Hidden-vector encryption with groups of prime order," Pairing'08, vol.5209, pp.75-88, 2008.
    • (2008) Pairing'08 , vol.5209 , pp. 75-88
    • Iovino, V.1    Persiano, G.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," CRYPTO'01, vol. 2139, pp.213-229, 2001.
    • (2001) CRYPTO'01 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • C. Gentry, "Practical identity-based encryption without random oracles," EUROCRYPT'06, vol. 4004, pp.445-464, 2006.
    • (2006) EUROCRYPT'06 , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 9
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • D. Boyen and B. Waters, "Anonymous hierarchical identity-based encryption (without random oracles)," CRYPTO'06, vol.4117, pp.290-307, 2006.
    • (2006) CRYPTO'06 , vol.4117 , pp. 290-307
    • Boyen, D.1    Waters, B.2
  • 10
    • 67049108616 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based enryption with constant size ciphertexts
    • J.H. Seo, T. Kobayashi, M. Oukubo, and K. Suzuki, "Anonymous hierarchical identity-based enryption with constant size ciphertexts," PKC'09, vol.5443, pp.215-234, 2009.
    • (2009) PKC'09 , vol.5443 , pp. 215-234
    • Seo, J.H.1    Kobayashi, T.2    Oukubo, M.3    Suzuki, K.4
  • 11
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • D. Boneh, A. Sahai, and B. Waters, "Fully collusion resistant traitor tracing with short ciphertexts and private keys," EUROCYYPT'06, vol.4004, pp.573-592, 2006.
    • (2006) EUROCYYPT'06 , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 12
    • 34547269833 scopus 로고    scopus 로고
    • A fully collusion resistant broadcast trace and revoke system with public traceability
    • ACM Press
    • D. Boneh and B. Waters, "A fully collusion resistant broadcast trace and revoke system with public traceability," ACM-CCS'06, pp. 211220, ACM Press, 2006.
    • (2006) ACM-cCS'06 , pp. 211-220
    • Boneh, D.1    Waters, B.2
  • 16
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," ACNS'05, vol.3531, pp.442-455, 2005.
    • (2005) ACNS'05 , vol.3531 , pp. 442-455
    • Chang, Y.C.1    Mitzenmacher, M.2
  • 17
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," TCC'09, vol.5444, pp.457-473, 2009.
    • (2009) TCC'09 , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 18
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulars ciphertexts
    • D. Boneh, E.J. Goh, and K. Nissim, "Evaluating 2-DNF formulars ciphertexts," TCC'05, vol.3378, pp.325-342, 2005.
    • (2005) TCC'05 , vol.3378 , pp. 325-342
    • Boneh, D.1    Goh, E.J.2    Nissim, K.3
  • 19
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," CRYPTO'04, vol.3152, pp.41-55, 2004.
    • (2004) CRYPTO'04 , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 20
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • D. Boneh and X. Boyen, "Efficient selective-ID secure identity based encryption without random oracles," EUROCRYPT'04, vol.3027, pp.223-238, 2004.
    • (2004) EUROCRYPT'04 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity based encryption
    • A. Sahai and B. Waters, "Fuzzy identity based encryption," EURO- CRYPT'05, vol.3494, pp.457-473, 2005.
    • (2005) EURO- CRYPT'05 , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 22
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • ACM Press
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," ACM- CCS'06, pp.89-98, ACM Press, 2006.
    • (2006) ACM- CCS'06 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 23
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption," TCC'07, vol.4392, pp.515-534, 2007.
    • (2007) TCC'07 , vol.4392 , pp. 515-534
    • Chase, M.1
  • 25
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • ACM Press
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," ACM-CCS 2007, ACM Press, pp.195-203, 2007.
    • (2007) ACM-cCS 2007 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.