메뉴 건너뛰기




Volumn 6056 LNCS, Issue , 2010, Pages 261-278

CCA proxy re-encryption without bilinear maps in the standard model

Author keywords

[No Author keywords available]

Indexed keywords

BILINEAR MAP; CHOSEN CIPHERTEXT ATTACK; CIPHERTEXTS; CRYPTOGRAPHIC APPLICATIONS; DIFFIE HELLMAN; ENCRYPTION SYSTEM; PROXY RE ENCRYPTIONS; RANDOM ORACLE MODEL; SECRET KEY; SEMANTIC SECURITY; SPECIAL PROPERTIES; THE STANDARD MODEL; THIRD PARTIES; TRAPDOOR FUNCTIONS;

EID: 77957655174     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13013-7_16     Document Type: Conference Paper
Times cited : (46)

References (23)
  • 1
    • 67650135696 scopus 로고    scopus 로고
    • Key-private proxy re-encryption
    • Fischlin, M. (ed.) RSA Conference 2009. Springer, Heidelberg
    • Ateniese, G., Benson, K., Hohenberger, S.: Key-Private Proxy Re-encryption. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 3
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and impossibility results for encryption and commitment secure under selective opening
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Bellare,M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 1-35
    • Bellare, M.1    Hofheinz, D.2    Yilek, S.3
  • 4
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 51849114183 scopus 로고    scopus 로고
    • On notions of security for deterministic encryption, and efficient constructions without random oracles
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Boldyreva, A., Fehr, S., O'Neill, A.: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335-359. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 335-359
    • Boldyreva, A.1    Fehr, S.2    O'neill, A.3
  • 6
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.), Alexandria, Virginia, USA, Octorber 2007. ACM, New York
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, Octorber 2007, pp. 185-194. ACM, New York (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 7
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption without pairings
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 8
    • 79955545739 scopus 로고    scopus 로고
    • More constructions of lossy and correlation-secure trapdoor functions
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More Constructions of Lossy and Correlation-Secure Trapdoor Functions. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 279-295. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 279-295
    • Freeman, D.M.1    Goldreich, O.2    Kiltz, E.3    Rosen, A.4    Segev, G.5
  • 9
    • 38049073133 scopus 로고    scopus 로고
    • Securely obfuscating reencryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Reencryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 11
    • 79961049494 scopus 로고    scopus 로고
    • From proxy encryption primitives to a deployable secure-mailing-list solution
    • Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
    • Khurana, H., Heo, J., Pant, M.: From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 260-281. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 260-281
    • Khurana, H.1    Heo, J.2    Pant, M.3
  • 12
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 14
    • 77954647089 scopus 로고    scopus 로고
    • Chosen-ciphertext security from slightly lossy trapdoor functions
    • Mol, P., Yilek, S.: Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. In: PKC (2010)
    • (2010) PKC
    • Mol, P.1    Yilek, S.2
  • 15
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: STOC, New Orleans, Louisiana, USA, May 1990, pp. 427-437. ACM, New York (1990) (Pubitemid 20729148)
    • (1990) Proc 22nd Annu ACM Symp Theory Comput , pp. 427-437
    • Naor Moni1    Yung Moti2
  • 16
    • 78650714193 scopus 로고    scopus 로고
    • Efficient non-interactive universally composable string-commitment schemes
    • Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. Springer, Heidelberg
    • Nishimaki, R., Fujisaki, E., Tanaka, K.: Efficient Non-interactive Universally Composable String-Commitment Schemes. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 3-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5848 , pp. 3-18
    • Nishimaki, R.1    Fujisaki, E.2    Tanaka, K.3
  • 17
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Ladner, R.E., Dwork, C. (eds.), Victoria, British Columbia, Canada, May 2008, ACM, New York
    • Peikert, C., Waters, B.: Lossy Trapdoor Functions and Their Applications. In: Ladner, R.E., Dwork, C. (eds.) STOC, Victoria, British Columbia, Canada, May 2008, pp. 187-196. ACM, New York (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 18
    • 67650676703 scopus 로고    scopus 로고
    • Efficient lossy trapdoor functions based on the composite residuosity assumption
    • Rosen, A., Segev, G.: Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption. Cryptology ePrint Archive, Report 2008/134 (2008), http://eprint.iacr.org/
    • (2008) Cryptology EPrint Archive, Report 2008/134
    • Rosen, A.1    Segev, G.2
  • 19
    • 67650674979 scopus 로고    scopus 로고
    • Chosen-ciphertext security via correlated products
    • Reingold, O. (ed.) Theory of Cryptography. Springer, Heidelberg
    • Rosen, A., Segev, G.: Chosen-Ciphertext Security via Correlated Products. In: Reingold, O. (ed.) Theory of Cryptography. LNCS, vol. 5444, pp. 419-436. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 419-436
    • Rosen, A.1    Segev, G.2
  • 20
    • 67049100266 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Shao, J., Cao, Z.: CCA-Secure Proxy Re-encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.