메뉴 건너뛰기




Volumn 6223 LNCS, Issue , 2010, Pages 191-208

Fully secure functional encryption with general relations from the decisional linear assumption

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS STRUCTURE; CIPHERTEXTS; ENCRYPTION SCHEMES; INNER PRODUCT; THE STANDARD MODEL;

EID: 77957011503     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14623-7_11     Document Type: Conference Paper
Times cited : (412)

References (28)
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) LNCS Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Franklin, M.K. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005 , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 58349086247 scopus 로고    scopus 로고
    • Generalized identity based and broadcast encryption scheme
    • Pieprzyk, J. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Hamburg, M.: Generalized identity based and broadcast encryption scheme. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008 , vol.5350 , pp. 455-470
    • Boneh, D.1    Hamburg, M.2
  • 8
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity based encryption
    • Menezes, A. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87-103. Springer, Heidelberg (2005)
    • (2005) CT-RSA 2005 , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 9
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Vadhan, S.P. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) TCC 2007 , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 11
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C., Camenisch, J.L. (eds.) LNCS Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 12
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Honary, B. (ed.) LNCS Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001 , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 13
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Vaudenay, S. (ed.) LNCS Springer, Heidelberg
    • Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006 , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 14
    • 70350663051 scopus 로고    scopus 로고
    • Hierarchical identity-based encryption with polynomially many levels
    • Reingold, O. (ed.) LNCS Springer, Heidelberg
    • Gentry, C., Halevi, S.: Hierarchical identity-based encryption with polynomially many levels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437-456. Springer, Heidelberg (2009)
    • (2009) TCC 2009 , vol.5444 , pp. 437-456
    • Gentry, C.1    Halevi, S.2
  • 15
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Zheng, Y. (ed.) LNCS Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) ASIACRYPT 2002 , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 17
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Smart, N.P. (ed.) LNCS Springer, Heidelberg
    • Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
    • (2008) EUROCRYPT 2008 , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 18
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Gilbert, H. (ed.) LNCS Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010 , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 19
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure HIBE with short ciphertexts
    • Micciancio, D. (ed.) LNCS Springer, Heidelberg
    • Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
    • (2010) TCC 2010 , vol.5978 , pp. 455-479
    • Lewko, A.B.1    Waters, B.2
  • 20
    • 52149087229 scopus 로고    scopus 로고
    • Homomorphic encryption and signatures from vector decomposition
    • Galbraith, S.D., Paterson, K.G. (eds.) LNCS Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Homomorphic encryption and signatures from vector decomposition. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 57-74. Springer, Heidelberg (2008)
    • (2008) Pairing 2008 , vol.5209 , pp. 57-74
    • Okamoto, T.1    Takashima, K.2
  • 21
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • Matsui, M. (ed.) LNCS Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 114-231. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009 , vol.5912 , pp. 114-231
    • Okamoto, T.1    Takashima, K.2
  • 24
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) LNCS Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) EU-ROCRYPT 2005 , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capability in predicate encryption systems
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldørsson, M.M., Ingølfsdøttir, A., Walukiewicz, I. (eds.) LNCS Springer, Heidelberg
    • Shi, E., Waters, B.: Delegating capability in predicate encryption systems. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldørsson, M.M., Ingølfsdøttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 560-578. Springer, Heidelberg (2008)
    • (2008) ICALP 2008 , vol.5126 , Issue.PART II , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 26
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity based encryption without random oracles
    • Cramer, R. (ed.) LNCS Springer, Heidelberg
    • Waters, B.: Efficient identity based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005 , vol.3494 , pp. 114-127
    • Waters, B.1
  • 28
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Halevi, S. (ed.) LNCS Springer, Heidelberg
    • Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.