메뉴 건너뛰기




Volumn 8, Issue , 2010, Pages 483-487

Identity-based broadcast encryption with recipient privacy

Author keywords

Broadcast encryption; Identity based; Recipient privacy

Indexed keywords

BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; BROADCAST SYSTEMS; CIPHERTEXTS; DISTRIBUTED CONTENT; IDENTITY-BASED; PRIVATE KEY; PUBLIC KEYS; RECIPIENT PRIVACY;

EID: 77958605406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSIT.2010.5564104     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 1
    • 84979291225 scopus 로고
    • Broadcast encryption
    • LNCS
    • Amos Fiat, Moni Naor, Broadcast Encryption, CRYPTO 1993, LNCS, vol. 773, pp.480-491, 1994.
    • (1994) CRYPTO 1993 , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 2
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • LNCS
    • Dalit Naor, Moni Naor, Jeffrey Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, LNCS, vol. 2139, pp. 41-62, 2001.
    • (2001) CRYPTO 2001 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 3
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • LNCS
    • Dani Halevy, Adi Shamir, The LSD Broadcast Encryption Scheme, CRYPTO 2002, LNCS, vol. 2442, pp. 47-60, 2002.
    • (2002) CRYPTO 2002 , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 4
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • LNCS
    • Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Efficient Tree-based Revocation in Groups of Low-state Devices, CRYPTO 2004, LNCS, vol. 3152, pp. 511-527, 2004.
    • (2004) CRYPTO 2004 , vol.3152 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 7
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant-size ciphertexts and private keys
    • LNCS
    • Cécile Delerabĺee, Identity-based Broadcast Encryption with Constant-size Ciphertexts and Private Keys, ASIACRYPT 2007, LNCS, vol. 4833, pp. 200-215, 2007.
    • (2007) ASIACRYPT 2007 , vol.4833 , pp. 200-215
    • Delerabĺee, C.1
  • 8
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS
    • Adi Shamir, Identity-based Cryptosystems and Signature Schemes, CRYPTO 1984, LNCS, vol. 196, pp. 47-53, 1985.
    • (1985) CRYPTO 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • LNCS
    • Dan Boneh, Matt Franklin, Identity-based Encryption from the Weil Pairing, CRYPTO 2001, LNCS, vol. 2139, pp. 213-229, 2001.
    • (2001) CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 10
    • 33746062799 scopus 로고    scopus 로고
    • Practical Identity-based Encryption without Random Oracles
    • LNCS
    • Craig Gentry, Practical Identity-based Encryption without Random Oracles, EUROCRYPT 2006, LNCS, vol. 4004, pp. 445-464, 2006.
    • (2006) EUROCRYPT 2006 , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 11
    • 33750065702 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • LNCS
    • Adam Barth, Dan Boneh, Brent Waters, Privacy in Encrypted Content Distribution Using Private Broadcast Encryption, FC 2006. LNCS, vol.4107, pp.52-64, 2006.
    • (2006) FC 2006 , vol.4107 , pp. 52-64
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 12
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • LNCS
    • Dan Boneh, Xavier Boyen, Eu-Jin Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, LNCS, vol. 3494, pp. 440-456, 2005.
    • (2005) EUROCRYPT 2005 , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.