메뉴 건너뛰기




Volumn 6756 LNCS, Issue PART 2, 2011, Pages 588-600

Adaptively secure non-interactive threshold cryptosystems

Author keywords

adaptive corruptions; digital signatures; encryption schemes; non interactivity; Threshold cryptography

Indexed keywords

ADAPTIVE CORRUPTIONS; DIGITAL SIGNATURE; ENCRYPTION SCHEMES; NON-INTERACTIVITY; THRESHOLD CRYPTOGRAPHY;

EID: 79959977713     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22012-8_47     Document Type: Conference Paper
Times cited : (26)

References (37)
  • 1
    • 33746104064 scopus 로고    scopus 로고
    • Simplified Threshold RSA with Adaptive and Proactive Security
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Almansa, J.F., Damgård, I.B., Nielsen, J.B.: Simplified Threshold RSA with Adaptive and Proactive Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 593-611. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 593-611
    • Almansa, J.F.1    Damgård, I.B.2    Nielsen, J.B.3
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS (1993)
    • (1993) ACM CCS
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 33745655389 scopus 로고    scopus 로고
    • Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Boneh, D., Boyen, X., Halevi, S.: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 226-243
    • Boneh, D.1    Boyen, X.2    Halevi, S.3
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Earlier version in Crypto 2001
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM J. of Computing 32(3), 586-615 (2003); Earlier version in Crypto 2001
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84958639277 scopus 로고    scopus 로고
    • Efficient Generation of Shared RSA Keys
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Efficient Generation of Shared RSA Keys. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 425-439. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • Beker, H.J., Piper, F.C. (eds.) Oxford University Press, Oxford
    • Boyd, C.: Digital Multisignatures. In: Beker, H.J., Piper, F.C. (eds.) Cryptography and Coding, pp. 241-246. Oxford University Press, Oxford (1989)
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 8
    • 33745767987 scopus 로고    scopus 로고
    • Direct Chosen Ciphertext Security from Identity-Based Techniques
    • Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: ACM CCS 2005 (2005)
    • (2005) ACM CCS 2005
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 9
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Earlier version in STOC 1998 (1998)
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004); Earlier version in STOC 1998 (1998)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 10
    • 84957083549 scopus 로고    scopus 로고
    • Adaptive Security for Threshold Cryptosystems
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive Security for Threshold Cryptosystems. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 98. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 98
    • Canetti, R.1    Gennaro, R.2    Jarecki, S.3    Krawczyk, H.4    Rabin, T.5
  • 11
    • 84957712291 scopus 로고    scopus 로고
    • An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Canetti, R., Goldwasser, S.: An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 90. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 90
    • Canetti, R.1    Goldwasser, S.2
  • 12
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 13. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13
    • Cramer, R.1    Shoup, V.2
  • 13
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 14
    • 84957717648 scopus 로고    scopus 로고
    • Efficient Multi-Party Computations Secure Against an Adaptive Adversary
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Cramer, R., Damgård, I.B., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multi-Party Computations Secure Against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 311. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311
    • Cramer, R.1    Damgård, I.B.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 15
    • 38149050474 scopus 로고    scopus 로고
    • CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • Daza, V., Herranz, J., Morillo, P., Ràfols, C.: CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 35-50. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 35-50
    • Daza, V.1    Herranz, J.2    Morillo, P.3    Ràfols, C.4
  • 16
    • 51849088550 scopus 로고    scopus 로고
    • Dynamic Threshold Public-Key Encryption
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Delerablée, C., Pointcheval, D.: Dynamic Threshold Public-Key Encryption. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 317-334. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 317-334
    • Delerablée, C.1    Pointcheval, D.2
  • 17
    • 85032188633 scopus 로고
    • Society and Group Oriented Cryptography: A New Concept
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 18
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.G.1    Frankel, Y.2
  • 19
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security of Multiple Encryption
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 20
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 21
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2), 281-308 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 49049089688 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 295. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 295
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 84946827596 scopus 로고    scopus 로고
    • Threshold Cryptosystems Secure against Chosen- Ciphertext Attacks
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Fouque, P.-A., Pointcheval, D.: Threshold Cryptosystems Secure against Chosen- Ciphertext Attacks. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 351. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 351
    • Fouque, P.-A.1    Pointcheval, D.2
  • 24
    • 84958045007 scopus 로고    scopus 로고
    • Adaptively-Secure Distributed Public-Key Systems
    • Ne?set?ril, J. (ed.) ESA 1999. Springer, Heidelberg
    • Frankel, Y., MacKenzie, P.D., Yung, M.: Adaptively-Secure Distributed Public-Key Systems. In: Ne?set?ril, J. (ed.) ESA 1999. LNCS, vol. 1643, pp. 4-27. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1643 , pp. 4-27
    • Frankel, Y.1    MacKenzie, P.D.2    Yung, M.3
  • 25
    • 84956868458 scopus 로고    scopus 로고
    • Adaptively-Secure Optimal-Resilience Proactive RSA
    • Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
    • Frankel, Y., MacKenzie, P.D., Yung, M.: Adaptively-Secure Optimal-Resilience Proactive RSA. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 180-195. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1716 , pp. 180-195
    • Frankel, Y.1    MacKenzie, P.D.2    Yung, M.3
  • 26
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
    • Extended Abstract. Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Jarecki, S., Lysyanskaya, A.: Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures (Extended Abstract). In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 221. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 221
    • Jarecki, S.1    Lysyanskaya, A.2
  • 27
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-ciphertext security from tag-based encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 28
    • 77954635558 scopus 로고    scopus 로고
    • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 29
    • 77949581448 scopus 로고    scopus 로고
    • New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 30
    • 84946834849 scopus 로고    scopus 로고
    • Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Lysyanskaya, A., Peikert, C.: Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 331. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 331
    • Lysyanskaya, A.1    Peikert, C.2
  • 31
    • 26444507178 scopus 로고    scopus 로고
    • An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • MacKenzie, P.: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567
    • MacKenzie, P.1
  • 33
    • 78650855071 scopus 로고    scopus 로고
    • Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    • Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
    • Qin, B., Wu, Q., Zhang, L., Domingo-Ferrer, J.: Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 62-76. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6476 , pp. 62-76
    • Qin, B.1    Wu, Q.2    Zhang, L.3    Domingo-Ferrer, J.4
  • 34
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 35
    • 84888872516 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems against Chosen Ciphertext Attack
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 36
    • 84948954277 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 207. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 207
    • Shoup, V.1
  • 37
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.