메뉴 건너뛰기




Volumn 6487 LNCS, Issue , 2010, Pages 347-366

Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS;

EID: 78650296407     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17455-1_22     Document Type: Conference Paper
Times cited : (52)

References (17)
  • 1
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C., Camenisch, J. (eds.) Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) Eurocrypt 2004 LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity based encryption from the Weil pairing. SIAM Journal on Computing 32(3), 586-615 (2003)
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 3
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Kilian, J. (ed. Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
    • (2005) TCC 2005 LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 4
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption a swiss army knife for identity-based cryptography
    • Boneh, D. (ed. Springer, Heidelberg (
    • Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
    • (2003) Crypto 2003 LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 6
    • 78650264424 scopus 로고    scopus 로고
    • Fully secure anonymous HIBE and secret- key anonymous IBE with short ciphertexts
    • De Caro, A., Iovino, V., Persiano, G.: Fully Secure Anonymous HIBE and Secret- Key Anonymous IBE with Short Ciphertexts. Cryptology ePrint Archive, Report 2010/197 (2010),
    • (2010) Cryptology ePrint Archive Report 2010 , vol.197
    • De Caro, A.1    Iovino, V.2    Persiano, G.3
  • 7
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai trees or how to delegate a lattice basis
    • Gilbert, H. (ed.
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010, pp. 523-552 (2010)
    • (2010) Eurocrypt 2010 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 8
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Honary, B. (ed. LNCS Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001 , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 9
    • 77954639466 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to prime-order groups
    • Gilbert, H. (ed. Springer, Heidelberg
    • Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
    • (2010) Eurocrypt 2010 LNCS , vol.6110 , pp. 44-61
    • Freeman, D.M.1
  • 10
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Knudsen, L.R. (ed. Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) Eurocrypt 2002 LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 11
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and hierarchical inner product encryption
    • Gilbert, H. (ed. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) Eurocrypt 2010 LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 12
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure hibe with short ciphertexts
    • Micciancio, D. (ed. Springer, Heidelberg
    • Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
    • (2010) TCC 2010 LNCS , vol.5978 , pp. 455-479
    • Lewko, A.B.1    Waters, B.2
  • 13
    • 67049108616 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption with constant size ciphertexts
    • Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg
    • Seo, J.H., Kobayashi, T., Ohkubo, M., Suzuki, K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 215-234. Springer, Heidelberg (2009)
    • (2009) PKC 2009 LNCS , vol.5443 , pp. 215-234
    • Seo, J.H.1    Kobayashi, T.2    Ohkubo, M.3    Suzuki, K.4
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) Crypto 1984 LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 15
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Reingold, O. (ed. Springer, Heidelberg
    • Shen, E., Shi, E.,Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
    • (2009) TCC 2009 LNCS , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 16
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capabilities in predicate encryption systems
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds. Springer, Heidelberg (
    • Shi, E., Waters, B.: Delegating capabilities in predicate encryption systems. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 560-578. Springer, Heidelberg (2008)
    • (2008) ICALP 2008 LNCS , vol.5126 , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 17
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Halevi, S. (ed. Springer, Heidelberg (
    • Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) Crypto 2009 LNCS , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.