메뉴 건너뛰기




Volumn , Issue , 2011, Pages 376-380

On the security of the identity-based encryption based on DHIES from ASIACCS 2010

Author keywords

Identity based encryption; Multivariate quadratic; XL

Indexed keywords

CRYPTOGRAPHY;

EID: 79956036822     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966962     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • M. Abdalla, M. Bellare, and P. Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In D. Naccache, editor, CT-RSA, volume 2020 of Lecture Notes in Computer Science, pages 143-158. Springer, 2001. (Pubitemid 33255161)
    • (2001) Lecture Notes in Computer Science , Issue.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 0010254147 scopus 로고    scopus 로고
    • Minimizing the use of random oracles in authenticated encryption schemes
    • M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Y. Han, T. Okamoto, and S. Qing, editors, ICICS, volume 1334 of Lecture Notes in Computer Science, pages 1-16. Springer, 1997. (Pubitemid 127148029)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 1-16
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • C. Cachin and J. Camenisch, editors, volume 3027 of Lecture Notes in Computer Science, Springer
    • D. Boneh and X. Boyen. Efficient selective-id secure identity-based encryption without random oracles. In C. Cachin and J. Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 223-238. Springer, 2004.
    • (2004) EUROCRYPT , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 6
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • M. K. Franklin, editor, volume 3152 of Lecture Notes in Computer Science, Springer
    • D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 443-459. Springer, 2004.
    • (2004) CRYPTO , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. SIAM J. Comput., 32(3):586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 67650159910 scopus 로고    scopus 로고
    • A tapestry of identity-based encryption: Practical frameworks compared
    • X. Boyen. A tapestry of identity-based encryption: practical frameworks compared. IJACT, 1(1):3-21, 2008.
    • (2008) IJACT , vol.1 , Issue.1 , pp. 3-21
    • Boyen, X.1
  • 9
    • 77954516750 scopus 로고    scopus 로고
    • Identity-based encryption based on DHIES
    • D. Feng, D. A. Basin, and P. Liu, editors, ACM
    • Y. Chen, M. Charlemagne, Z. Guan, J. bin Hu, and Z. Chen. Identity-based encryption based on DHIES. In D. Feng, D. A. Basin, and P. Liu, editors, ASIACCS, pages 82-88. ACM, 2010.
    • (2010) ASIACCS , pp. 82-88
    • Chen, Y.1    Charlemagne, M.2    Guan, Z.3    Hu, J.B.4    Chen, Z.5
  • 10
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • B. Honary, editor, volume 2260 of Lecture Notes in Computer Science, Springer
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In B. Honary, editor, IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, pages 360-363. Springer, 2001.
    • (2001) IMA Int. Conf. , pp. 360-363
    • Cocks, C.1
  • 11
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • B. Preneel, editor, volume 1807 of Lecture Notes in Computer Science, Springer
    • N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In B. Preneel, editor, EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, pages 392-407. Springer, 2000.
    • (2000) EUROCRYPT , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 12
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • C. Dwork, editor, ACM
    • C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In C. Dwork, editor, STOC, pages 197-206. ACM, 2008.
    • (2008) STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 13
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the hfe public key cryptosystem by relinearization
    • M. J. Wiener, editor, volume 1666 of Lecture Notes in Computer Science, Springer
    • A. Kipnis and A. Shamir. Cryptanalysis of the hfe public key cryptosystem by relinearization. In M. J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Springer, 1999.
    • (1999) CRYPTO , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 14
    • 26444602504 scopus 로고    scopus 로고
    • Identity based encryption without redundancy
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • B. Libert and J.-J. Quisquater. Identity based encryption without redundancy. In J. Ioannidis, A. D. Keromytis, and M. Yung, editors, ACNS, volume 3531 of Lecture Notes in Computer Science, pages 285-300, 2005. (Pubitemid 41422123)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 285-300
    • Libert, B.1    Quisquater, J.-J.2
  • 15
    • 79956012817 scopus 로고    scopus 로고
    • Some recent progress in lattice-based cryptography
    • O. Reingold, editor, volume 5444 of Lecture Notes in Computer Science, Springer
    • C. Peikert. Some recent progress in lattice-based cryptography. In O. Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, page 72. Springer, 2009.
    • (2009) TCC , pp. 72
    • Peikert, C.1
  • 17
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 47-53, 1984.
    • (1984) CRYPTO , pp. 47-53
    • Shamir, A.1
  • 18
    • 85115374351 scopus 로고
    • Algorithms for quantum computation: Discrete logarithms and factoring
    • IEEE
    • P. W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In FOCS, pages 124-134. IEEE, 1994.
    • (1994) FOCS , pp. 124-134
    • Shor, P.W.1
  • 19
    • 35248891001 scopus 로고    scopus 로고
    • Access control using pairing based cryptography
    • M. Joye, editor, volume 2612 of Lecture Notes in Computer Science, Springer
    • N. P. Smart. Access control using pairing based cryptography. In M. Joye, editor, CT-RSA, volume 2612 of Lecture Notes in Computer Science, pages 111-121. Springer, 2003.
    • (2003) CT-RSA , pp. 111-121
    • Smart, N.P.1
  • 20
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters. Efficient identity-based encryption without random oracles. In R. Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 114-127. Springer, 2005. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 21
    • 79956056973 scopus 로고    scopus 로고
    • Applications of multivariate quadratic public key systems
    • H. Federrath, editor, volume 62 of LNI, GI
    • C. Wolf and B. Preneel. Applications of multivariate quadratic public key systems. In H. Federrath, editor, Sicherheit, volume 62 of LNI, pages 413-424. GI, 2005.
    • (2005) Sicherheit , pp. 413-424
    • Wolf, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.