메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Multi-use unidirectional proxy re-encryption

Author keywords

Chosen Ciphertext Security; Collusion Resistance; Multi usability; Proxy Re encryption; Unidirectionality

Indexed keywords

CHOSEN CIPHERTEXT SECURITY; COLLUSION RESISTANCE; MULTI-USABILITY; PROXY RE ENCRYPTIONS; UNIDIRECTIONALITY;

EID: 80052169483     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icc.2011.5962455     Document Type: Conference Paper
Times cited : (19)

References (22)
  • 1
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • EUROCRYPT 1998
    • M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT 1998, volume 1403 of LNCS, pages 127-144, 1998.
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 2
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • X. Lin, X. Sun, H. Zhu, P.-H. Ho, and X. Shen. GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transaction on Vehicular Technology, 56(7):3442-3456, 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 I , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 3
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In IEEE INFOCOM 2008, 2008.
    • IEEE INFOCOM 2008, 2008
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 4
    • 77953313061 scopus 로고    scopus 로고
    • SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks
    • R. Lu, X. Lin, and X. Shen. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. In IEEE INFOCOM 2010, 2010.
    • IEEE INFOCOM 2010, 2010
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 5
    • 85180411878 scopus 로고    scopus 로고
    • Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage. In Internet Society (ISOC): NDSS 2005, pages 29-43, 2005.
    • (2005) Internet Society (ISOC): NDSS 2005 , pp. 29-43
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 6
    • 38049061546 scopus 로고    scopus 로고
    • Identity-Based Proxy Re-encryption
    • ACNS 2007, Full version: Cryptology ePrint Archieve: Report 2006/473
    • M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288-306, 2007. Full version: Cryptology ePrint Archieve: Report 2006/473.
    • (2007) LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 7
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Proxy Re- Encryption
    • Full version: Cryptology ePrint Archieve: Report 2007/171
    • R. Canetti and S. Hohenberger. Chosen-Ciphertext Secure Proxy Re- Encryption. In ACM CCS 2007, 2007. Full version: Cryptology ePrint Archieve: Report 2007/171.
    • ACM CCS 2007, 2007
    • Canetti, R.1    Hohenberger, S.2
  • 8
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    • PKC 2008
    • B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In PKC 2008, volume 4939 of LNCS, pages 360-379, 2008.
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 9
    • 70349254785 scopus 로고    scopus 로고
    • RSA-TBOS Signcryption with Proxy Reencryption
    • V. Kirtane and C. P. Rangan. RSA-TBOS Signcryption with Proxy Reencryption. In ACM DRM 2008, pages 59-66, 2008.
    • (2008) ACM DRM 2008 , pp. 59-66
    • Kirtane, V.1    Rangan, C.P.2
  • 10
    • 67049100266 scopus 로고    scopus 로고
    • CCA-Secure Proxy Re-Encryption without Pairings
    • PKC 2009
    • J. Shao and Z. Cao. CCA-Secure Proxy Re-Encryption without Pairings. In PKC 2009, volume 5443 of LNCS, pages 357-376, 2009.
    • (2009) LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 11
    • 77953307109 scopus 로고    scopus 로고
    • SCCR: A generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
    • J. Shao, Z. Cao, and P. Liu. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. SECURITY AND COMMUNICATION NETWORKS, 2009.
    • (2009) Security and Communication Networks
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 12
    • 77952322019 scopus 로고    scopus 로고
    • CCASecure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
    • Updated version
    • J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen, and Feng Bao. CCASecure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. Science China Information Sciences, 53(3):593-606, 2010. Updated version: http://eprint.iacr.org/2010/265.
    • (2010) Science China Information Sciences , vol.53 , Issue.3 , pp. 593-606
    • Weng, J.1    Chen, M.2    Yang, Y.3    Deng, R.H.4    Chen, K.5    Bao, F.6
  • 13
    • 67650135696 scopus 로고    scopus 로고
    • Key-Private Proxy Re- Encryption
    • RSA 2009
    • G. Ateniese, K. Benson, and S. Hohenberger. Key-Private Proxy Re- Encryption. In RSA 2009, volume 5473 of LNCS, pages 279-294, 2009.
    • (2009) LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO 1984
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 1984, volume 196 of LNCS, pages 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 15
    • 77957655174 scopus 로고    scopus 로고
    • CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
    • PKC 2010
    • T. Matsuda, R. Nishimaki, and K. Tanaka. CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. In PKC 2010, volume 6056 of LNCS, pages 261-278, 2010.
    • (2010) LNCS , vol.6056 , pp. 261-278
    • Matsuda, T.1    Nishimaki, R.2    Tanaka, K.3
  • 16
    • 58449122500 scopus 로고    scopus 로고
    • Chosen- Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
    • CANS 2008
    • J. Weng, R. H. Deng, S. Liu, K. Chen, J. Lai, and X. Wang. Chosen- Ciphertext Secure Proxy Re-Encryption Schemes without Pairings. In CANS 2008, volume 5339 of LNCS, pages 1-17, 2008.
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Weng, J.1    Deng, R.H.2    Liu, S.3    Chen, K.4    Lai, J.5    Wang, X.6
  • 17
    • 77953505052 scopus 로고    scopus 로고
    • Efficient Unidirectional Proxy Re-Encryption
    • Africacrypt 2010, Full version
    • S.S.M. Chow, J. Weng, Y. Yang, and R.H. Deng. Efficient Unidirectional Proxy Re-Encryption. In Africacrypt 2010, volume 6055 of LNCS, pages 316-332, 2010. Full version: http://eprint.iacr.org/2009/189.
    • (2010) LNCS , vol.6055 , pp. 316-332
    • Chow, S.S.M.1    Weng, J.2    Yang, Y.3    Deng, R.H.4
  • 18
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In ACM STOC 2009, pages 169-178, 2009.
    • (2009) ACM STOC 2009 , pp. 169-178
    • Gentry, C.1
  • 19
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based Proxy Re-encryption Without Random Oracles
    • ISC 2007
    • C. Chu and W. Tzeng. Identity-based Proxy Re-encryption Without Random Oracles. In ISC 2007, volume 4779 of LNCS, pages 189-202, 2007.
    • (2007) LNCS , vol.4779 , pp. 189-202
    • Chu, C.1    Tzeng, W.2
  • 20
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • EUROCRPYT 2006
    • C. Gentry. Practical identity-based encryption without random oracles. In EUROCRPYT 2006, volume 4004 of LNCS, pages 445-464, 2006.
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 22
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • EUROCRYPT 2004
    • R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222, 2004.
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.