메뉴 건너뛰기




Volumn 6487 LNCS, Issue , 2010, Pages 327-346

New identity-based proxy re-encryption schemes to prevent collusion attacks

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; COLLUSION ATTACK; IDENTITY-BASED; NEW CONSTRUCTIONS; PROXY RE ENCRYPTIONS; RANDOM ORACLE MODEL; RE-ENCRYPTION; SECURITY MODEL; SINGLE-HOP; TRUST ASSUMPTIONS; UNIDIRECTIONALITY;

EID: 78650288030     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17455-1_21     Document Type: Conference Paper
Times cited : (52)

References (19)
  • 1
    • 67650135696 scopus 로고    scopus 로고
    • Key-private proxy re-encryption
    • Fischlin, M. (ed. Springer, Heidelberg (
    • Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
    • (2009) CT-RSA 2009 LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) Eurocrypt 1998 LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Franklin, M. (ed. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
    • (2004) Crypto 2004 LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) Crypto 2001 LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C., Camenisch, J.L. (eds. Springer Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) Eurocrypt 2004 LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 7
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • ACM New York
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: CCS 2007, pp. 185-194. ACM, New York (2007)
    • (2007) CCS 2007 , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 8
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds. Springer, Heidelberg
    • Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
    • (2007) ISC 2007 LNCS , vol.4779 , pp. 189-202
    • Chu, C.1    Tzeng, W.2
  • 9
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy reencryption without pairings
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds Springer, Heidelberg
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy reencryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) CANS 2008 LNCS , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 10
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Katz, J., Yung, M. (eds Springer, Heidelberg
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) ACNS 2007 LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 11
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • Sion, R., Curtmola, R.,Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds. LNCS Springer, Heidelberg
    • Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R.,Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
    • (2010) RLCPS WECSR and WLC 2010 , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 12
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy reencryption
    • Cramer, R. (ed. Springer Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) PKC 2008 LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 13
    • 52149099038 scopus 로고    scopus 로고
    • Tracing malicious proxies in proxy re-encryption
    • Galbraith, S.D., Paterson, K.G. (eds. Springer Heidelberg
    • Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332- 353. Springer, Heidelberg (2008)
    • (2008) Pairing 2008 LNCS , vol.5209 , pp. 332-353
    • Libert, B.1    Vergnaud, D.2
  • 14
    • 50049099260 scopus 로고    scopus 로고
    • Proxy re-encryption systems for identity-based encryption
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds Springer Heidelberg
    • Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
    • (2007) Pairing 2007 LNCS , vol.4575 , pp. 247-267
    • Matsuo, T.1
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds Springer Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984 LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 67049100266 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Jarecki, S., Tsudik, G. (eds. Springer Heidelberg
    • Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
    • (2009) PKC 2009 LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 18
    • 67650109748 scopus 로고    scopus 로고
    • Inter-domain identity-based proxy reencryption
    • Yung, M., Liu, P., Lin, D. (eds Springer, Heidelberg
    • Tang, Q., Hartel, P.H., Jonker, W.: Inter-domain identity-based proxy reencryption. In: Yung, M., Liu, P., Lin, D. (eds.) INSCRYPT 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2008)
    • (2008) Inscrypt 2008 LNCS , vol.5487 , pp. 332-347
    • Tang, Q.1    Hartel, P.H.2    Jonker, W.3
  • 19
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure scalable and fine-grained data access control in cloud computing
    • IEEE Los Alamitos
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: InfoCom 2010, pp. 534-542. IEEE, Los Alamitos (2010)
    • (2010) InfoCom 2010 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.