메뉴 건너뛰기




Volumn 58, Issue 3, 2011, Pages 235-257

Inner-product encryption under standard assumptions

Author keywords

Bilinear maps; Inner product encryption; Predicate encryption

Indexed keywords

BILINEAR MAP; COMPOSITE-ORDER GROUPS; DIFFIE HELLMAN; ENCRYPTION SCHEMES; FIRST CONSTRUCTIONS; INNER PRODUCT; INNER-PRODUCT ENCRYPTION; NOVEL TECHNIQUES; PREDICATE ENCRYPTION; PRIME ORDERS; PUBLIC-KEY ENCRYPTION; STANDARD ASSUMPTIONS;

EID: 79952189632     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-010-9405-9     Document Type: Article
Times cited : (64)

References (22)
  • 2
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. (2007). (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT'04, vol. 3027, pp. 223-238. (2004).
    • (2004) EUROCRYPT'04 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO'04, vol. 3152, pp. 41-55 (2004).
    • (2004) CRYPTO'04 , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: CRYPTO'01, vol. 2139, pp. 213-229. (2001). (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryption without pairings
    • Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: FOCS'07, pp. 647-657. (2007).
    • (2007) FOCS'07 , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 8
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: TCC'07, vol. 4392, pp. 535-554. (2007).
    • (2007) TCC'07 , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 11
    • 79952188383 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cocks C.: An identity based encryption scheme based on quadratic residues. In: IMA'01. (2001).
    • (2001) IMA'01
    • Cocks, C.1
  • 14
    • 52149090559 scopus 로고    scopus 로고
    • Hidden-vector encryption with groups of prime order
    • Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Pairing'08, vol. 5209, pp. 75-88. (2008).
    • (2008) Pairing'08 , vol.5209 , pp. 75-88
    • Iovino, V.1    Persiano, G.2
  • 16
    • 77957002082 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner-product encryption
    • Lewko A., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner-product encryption. To appear in EUROCRYPT'10 (2010).
    • (2010) EUROCRYPT'10
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 17
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: ASIACRYPT'09, vol. 5912, pp. 214-231 (2009).
    • (2009) ASIACRYPT'09 , vol.5912 , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 18
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM-CCS'07, pp. 195-203. (2007).
    • (2007) ACM-CCS'07 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 19
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai A., Waters B.: Fuzzy identity-based encryption. In: EUROCRYPT'05, vol. 3494, pp. 457-473 (2005). (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 20
    • 67049108616 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based enryption with constant size ciphertexts
    • Seo J.H., Kobayashi T., Oukubo M., Suzuki K.: Anonymous hierarchical identity-based enryption with constant size ciphertexts. In: PKC'09, vol. 5443, pp. 215-234. (2009).
    • (2009) PKC'09 , vol.5443 , pp. 215-234
    • Seo, J.H.1    Kobayashi, T.2    Oukubo, M.3    Suzuki, K.4
  • 21
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Waters B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT'05, vol. 3494, pp. 114-127. (2005). (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 22
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO'09, vol. 5677, pp. 619-636. (2009).
    • (2009) CRYPTO'09 , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.