메뉴 건너뛰기




Volumn 4, Issue 5, 2010, Pages 968-988

New techniques for anonymous HIBE with short ciphertexts in prime order groups

Author keywords

Anonymity; Bilinear pairing; Cryptography; Hierarchical identity based encryption; Identity based encryption; Provable security

Indexed keywords


EID: 78449250327     PISSN: None     EISSN: 19767277     Source Type: Journal    
DOI: 10.3837/tiis.2010.10.016     Document Type: Article
Times cited : (4)

References (31)
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M.K. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 70350663051 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with polynomially many levels
    • C. Gentry and S. Halevi, "Hierarchical identity based encryption with polynomially many levels," in TCC 2009, Lecture Notes in Computer Science, vol. 5444, pp. 437-456, 2009.
    • (2009) TCC 2009, Lecture Notes in Computer Science , vol.5444 , pp. 437-456
    • Gentry, C.1    Halevi, S.2
  • 9
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • B. Waters, "Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 619-636, 2009.
    • (2009) Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science , vol.5677 , pp. 619-636
    • Waters, B.1
  • 10
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure HIBE with short ciphertexts
    • A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure HIBE with short ciphertexts," in TCC 2010, Lecture Notes in Computer Science, vol. 5978, pp. 455-479, 2010.
    • (2010) TCC 2010, Lecture Notes in Computer Science , vol.5978 , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 13
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capabilities in predicate encryption systems
    • E. Shi and B. Waters, "Delegating capabilities in predicate encryption systems," in ICALP 2008. Lecture Notes in Computer Science, vol. 5126, pp. 560-578, 2008.
    • (2008) ICALP 2008. Lecture Notes in Computer Science , vol.5126 , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 16
    • 77952048540 scopus 로고    scopus 로고
    • Anonymity from asymmetry: New constructions for anonymous HIBE
    • L. Ducas, "Anonymity from asymmetry: New constructions for anonymous HIBE," in CT-RSA 2010, Lecture Notes in Computer Science, vol. 5985, pp. 148-164, 2010.
    • (2010) CT-RSA 2010, Lecture Notes in Computer Science , vol.5985 , pp. 148-164
    • Ducas, L.1
  • 17
    • 77955872093 scopus 로고    scopus 로고
    • On anonymity in an electronic society: A survey of anonymous communication systems
    • article 5
    • M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Computing Surveys, vol. 42, no. 1, article 5, 2009.
    • (2009) ACM Computing Surveys , vol.42 , Issue.1
    • Edman, M.1    Yener, B.2
  • 28
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in TCC 2007. Lecture Notes in Computer Science, vol. 4392, pp. 535-554, 2007.
    • (2007) TCC 2007. Lecture Notes in Computer Science , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.