메뉴 건너뛰기




Volumn 5848 LNCS, Issue , 2009, Pages 47-60

Anonymous conditional proxy re-encryption without random oracle

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; DELEGATORS; EFFICIENT CONSTRUCTION; OPEN PROBLEMS; PROXY RE ENCRYPTIONS; PUBLIC KEYS; RANDOM ORACLE; SECURITY MODEL; WITHOUT RANDOM ORACLES;

EID: 78249251589     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04642-1_6     Document Type: Conference Paper
Times cited : (46)

References (21)
  • 2
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Advances in Cryptology - EUROCRYPT 2004
    • Boneh, D., Boyen, X.: Efficient selective-ID based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004) (Pubitemid 38717007)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Advances in Cryptology - EUROCRYPT 2004
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004) (Pubitemid 38717023)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 229-231. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 229-231
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • ACM Press, New York
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proc. of 30th ACM STOC, pp. 209-218. ACM Press, New York (1998)
    • (1998) Proc. of 30th ACM STOC , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 8
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 10
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 11
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
    • Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4779 , pp. 189-202
    • Chu, C.1    Tzeng, W.2
  • 12
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-cipertext secure proxy re-encryption without pairings
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-cipertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 13
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
    • Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 14
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 15
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 16
    • 43149089620 scopus 로고    scopus 로고
    • CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption
    • Malkin, T.G. (ed.) CT-RSA 2008. Springer, Heidelberg
    • Kiltz, E., Vahlis, Y.: CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 221-238. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4964 , pp. 221-238
    • Kiltz, E.1    Vahlis, Y.2
  • 17
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 18
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • Rhee, H.S., Susilo, W., Kim, H.-J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237-243 (2009)
    • (2009) IEICE Electron. Express , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.-J.3
  • 19
    • 67049100266 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Proc. of PKC 2009. Springer, Heidelberg
    • Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Proc. of PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 20
    • 67049122562 scopus 로고    scopus 로고
    • Analysis of CCA secure unidirectional ID-based PRE scheme
    • Shanghai Jiao Tong University
    • Shao, J., Xing, D., Cao, Z.: Analysis of CCA secure unidirectional ID-based PRE scheme. Technical Report of TDT, Shanghai Jiao Tong University (2008)
    • (2008) Technical Report of TDT
    • Shao, J.1    Xing, D.2    Cao, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.