메뉴 건너뛰기




Volumn 4, Issue 7, 2009, Pages 641-648

Efficient ID-based secure encryption scheme for anonymous receivers

Author keywords

Anonymous receivers; ID based encryption; Privacy protection; Secure encryption

Indexed keywords

ANONYMOUS RECEIVERS; ENCRYPTION SCHEMES; ID-BASED; ID-BASED ENCRYPTION; MESSAGE RECEIVERS; PRIVACY PROTECTION; SECURE ENCRYPTION;

EID: 78651545720     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.4.7.641-648     Document Type: Article
Times cited : (4)

References (10)
  • 1
    • 45849114774 scopus 로고    scopus 로고
    • A Convertible Multi-Authenticated Encryption scheme for group communications
    • T.-Y. Chang, "A Convertible Multi-Authenticated Encryption scheme for group communications," Information Sciences, vol. 178, no. 17, pp. 3426-3434, 2008.
    • (2008) Information Sciences , vol.178 , Issue.17 , pp. 3426-3434
    • Chang, T.-Y.1
  • 2
    • 37549042833 scopus 로고    scopus 로고
    • Broadcast group-oriented encryption secure against chosen ciphertext attack
    • C. Ma, J. Ao, J. Li, "Broadcast group-oriented encryption secure against chosen ciphertext attack," Journal of Systems Engineering and Electronics, vol. 18, no. 4, pp. 811-817, 2007.
    • (2007) Journal of Systems Engineering and Electronics , vol.18 , Issue.4 , pp. 811-817
    • Ma, C.1    Ao, J.2    Li, J.3
  • 3
    • 33646240366 scopus 로고    scopus 로고
    • Unconditionally secure anonymous encryption and group authentication
    • H. Goichiro, S. Junji, H. Yumiko, I. Hideki, "Unconditionally secure anonymous encryption and group authentication," Computer Journal, vol. 49, no. 3, pp. 310-321, 2006.
    • (2006) Computer Journal , vol.49 , Issue.3 , pp. 310-321
    • Goichiro, H.1    Junji, S.2    Yumiko, H.3    Hideki, I.4
  • 4
    • 33746356856 scopus 로고    scopus 로고
    • Representation attacks on the braid Diffie-Hellman public key encryption
    • K. G. Arkadius, "Representation attacks on the braid Diffie-Hellman public key encryption," Applicable Algebra in Engineering, Communications and Computing, vol. 17, no. 3-4, pp. 257-266, 2006.
    • (2006) Applicable Algebra in Engineering, Communications and Computing , vol.17 , Issue.3-4 , pp. 257-266
    • Arkadius, K.G.1
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Idetity-Based Encryption form the Weil Pairing
    • D. Boneh, M. Franklin, "Idetity-Based Encryption form the Weil Pairing," SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 85025586099 scopus 로고    scopus 로고
    • Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
    • Springer
    • S. Chatterjee, P. Sarkar, "Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext," Lecture Notes in Computer Science (LNCS), Springer, 2006, Vol. 4329, pp. 394-408.
    • (2006) Lecture Notes in Computer Science (LNCS) , vol.4329 , pp. 394-408
    • Chatterjee, S.1    Sarkar, P.2
  • 7
    • 24144432124 scopus 로고    scopus 로고
    • Efficient Multi- Receiver Identity-Based Encryption and Its Application to Broadcast Encryption
    • Springer
    • J. Baek, R. Safavi-Naini, W. Susilo, "Efficient Multi- Receiver Identity-Based Encryption and Its Application to Broadcast Encryption," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3386, pp. 380-397.
    • (2005) Lecture Notes in Computer Science (LNCS) , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 9
    • 24144434019 scopus 로고    scopus 로고
    • Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
    • Springer
    • T. H. Yuen, V. K. Wei, "Fast and Proven Secure Blind Identity-Based Signcryption from Pairings," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3376, pp. 305-322.
    • (2005) Lecture Notes in Computer Science (LNCS) , vol.3376 , pp. 305-322
    • Yuen, T.H.1    Wei, V.K.2
  • 10
    • 26444440344 scopus 로고    scopus 로고
    • Secure encryption Where Group Manager Members Open Authority Are Identity-Based
    • Springer
    • V. K. Wei, T. H. Yuen, F. Zhang, "Secure encryption Where Group Manager Members Open Authority Are Identity-Based," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3574, pp. 468-480.
    • (2005) Lecture Notes in Computer Science (LNCS) , vol.3574 , pp. 468-480
    • Wei, V.K.1    Yuen, T.H.2    Zhang, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.