메뉴 건너뛰기




Volumn 180, Issue 20, 2010, Pages 4042-4059

Multi-use and unidirectional identity-based proxy re-encryption schemes

Author keywords

Bilinear pairing; Dynamic directed graph; Identity based encryption; Proxy re encryption; Random padding

Indexed keywords

BILINEAR PAIRING; CIPHERTEXTS; DIFFIE-HELLMAN ASSUMPTION; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; NEW CONSTRUCTIONS; OPEN PROBLEMS; PROXY RE ENCRYPTIONS; RANDOM ORACLE MODEL; RANDOM PADDING; UNIDIRECTIONALITY; USEFUL PROPERTIES;

EID: 77958151362     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.06.029     Document Type: Article
Times cited : (62)

References (34)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • EUROCRYPT
    • J.H. An, Y. Dodis, and T. Rabin On the security of joint signature and encryption L.R. Knudsen, EUROCRYPT Lecture Notes in Computer Science vol. 2332 2002 Springer 83 107
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • The Internet Society
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage NDSS 2005 The Internet Society
    • (2005) NDSS
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inform. Syst. Secur. 9 1 2006 1 30
    • (2006) ACM Trans. Inform. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 5
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • M. Bellare, P. Rogaway, Optimal asymmetric encryption, in: EUROCRYPT, 1994, pp. 92-111.
    • (1994) EUROCRYPT , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • M. Bellare, P. Rogaway, The exact security of digital signatures - how to sign with RSA and Rabin, in: EUROCRYPT, 1996, pp. 399-416.
    • (1996) EUROCRYPT , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography, in: EUROCRYPT, 1998, pp. 127-144.
    • (1998) EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 10
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • D. Boneh, B. Lynn, and H. Shacham Short signatures from the weil pairing J. Cryptol. 17 4 2004 297 319
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 12
    • 55949088433 scopus 로고    scopus 로고
    • A secure identity-based proxy multi-signature scheme
    • F. Cao, and Z. Cao A secure identity-based proxy multi-signature scheme Inform. Sci. 179 3 2009 292 302
    • (2009) Inform. Sci. , vol.179 , Issue.3 , pp. 292-302
    • Cao, F.1    Cao, Z.2
  • 13
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • CRYPTO
    • J.-S. Coron On the exact security of full domain hash M. Bellare, CRYPTO Lecture Notes in Computer Science vol. 1880 2000 Springer 229 235
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • CRYPTO
    • R. Cramer, and V. Shoup A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack H. Krawczyk, CRYPTO Lecture Notes in Computer Science vol. 1462 1998 Springer 13 25
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 15
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption without pairings
    • CANS
    • R.H. Deng, J. Weng, S. Liu, and K. Chen Chosen-ciphertext secure proxy re-encryption without pairings M.K. Franklin, L.C.K. Hui, D.S. Wong, CANS Lecture Notes in Computer Science vol. 5339 2008 Springer 1 17
    • (2008) Lecture Notes in Computer Science , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 16
    • 85028450627 scopus 로고
    • Non-malleable cryptography (extended abstract)
    • ACM
    • D. Dolev, C. Dwork, and M. Naor Non-malleable cryptography (extended abstract) STOC 1991 ACM 542 552
    • (1991) STOC , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 17
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • D. Dolev, C. Dwork, and M. Naor Nonmalleable cryptography SIAM J. Comput. 30 2 2000 391 437
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 19
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T.E. Gamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inform. Theor. 31 4 1985 469 472
    • (1985) IEEE Trans. Inform. Theor. , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 21
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • ACNS
    • M. Green, and G. Ateniese Identity-based proxy re-encryption J. Katz, M. Yung, ACNS Lecture Notes in Computer Science vol. 4521 2007 Springer 288 306
    • (2007) Lecture Notes in Computer Science , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 22
    • 33750371530 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    • C.-L. Hsu, K.-Y. Tsai, and P.-L. Tsai Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Inform. Sci. 177 2 2007 543 549
    • (2007) Inform. Sci. , vol.177 , Issue.2 , pp. 543-549
    • Hsu, C.-L.1    Tsai, K.-Y.2    Tsai, P.-L.3
  • 23
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • Public Key Cryptography
    • M. Jakobsson On quorum controlled asymmetric proxy re-encryption H. Imai, Y. Zheng, Public Key Cryptography Lecture Notes in Computer Science vol. 1560 1999 Springer 112 121
    • (1999) Lecture Notes in Computer Science , vol.1560 , pp. 112-121
    • Jakobsson, M.1
  • 24
    • 84880868695 scopus 로고    scopus 로고
    • Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference
    • J. Kilian (Ed.) Santa Barbara, California, USA, August 19-23, 2001 Springer
    • J. Kilian (Ed.), Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, Lecture Notes in Computer Science, vol. 2139, Springer, 2001.
    • (2001) Proceedings, Lecture Notes in Computer Science , vol.2139
  • 25
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Public Key Cryptography
    • B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption R. Cramer, Public Key Cryptography Lecture Notes in Computer Science vol. 4939 2008 Springer 360 379
    • (2008) Lecture Notes in Computer Science , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 26
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts (special section on cryptography and information security)
    • M. Mambo, and E. Okamoto Proxy cryptosystems: delegation of the power to decrypt ciphertexts (special section on cryptography and information security) IEICE Trans. Fund. Electron. Commun. Comput. Sci. 80 1 1997 54 63
    • (1997) IEICE Trans. Fund. Electron. Commun. Comput. Sci. , vol.80 , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 29
    • 67049100266 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Public Key Cryptography
    • J. Shao, and Z. Cao CCA-secure proxy re-encryption without pairings S. Jarecki, G. Tsudik, Public Key Cryptography Lecture Notes in Computer Science vol. 5443 2009 Springer 357 376
    • (2009) Lecture Notes in Computer Science , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 30
    • 77950864045 scopus 로고    scopus 로고
    • Proxy re-encryption with keyword search
    • J. Shao, Z. Cao, X. Liang, and H. Lin Proxy re-encryption with keyword search Inf. Sci. 180 13 2010 2576 2587
    • (2010) Inf. Sci. , vol.180 , Issue.13 , pp. 2576-2587
    • Shao, J.1    Cao, Z.2    Liang, X.3    Lin, H.4
  • 34
    • 34447330138 scopus 로고    scopus 로고
    • How to construct secure proxy cryptosystem
    • Y. Zhou, B. Fang, Z. Cao, X. chun Yun, and X. Cheng How to construct secure proxy cryptosystem Inform. Sci. 177 19 2007 4095 4108
    • (2007) Inform. Sci. , vol.177 , Issue.19 , pp. 4095-4108
    • Zhou, Y.1    Fang, B.2    Cao, Z.3    Chun Yun, X.4    Cheng, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.