메뉴 건너뛰기




Volumn 7038 LNCS, Issue , 2011, Pages 210-229

Unforgeability of re-encryption keys against collusion attack in proxy re-encryption

Author keywords

non transferability; Proxy re encryption; unforgeability of re encryption keys

Indexed keywords

CIPHERTEXTS; COLLUSION ATTACK; DELEGATORS; NON-TRANSFERABILITY; PROXY RE ENCRYPTIONS; RE-ENCRYPTION; UNFORGEABILITY; WITHOUT RANDOM ORACLES;

EID: 80455132286     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25141-2_14     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 85180411878 scopus 로고    scopus 로고
    • Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS 2005 (2005)
    • (2005) NDSS 2005
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Advances in Cryptology - CRYPTO '98
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 4
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Proxy Re-Encryption
    • Canetti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: ACM CCS 2007, pp. 185-194 (2007)
    • (2007) ACM CCS 2007 , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 6
    • 77953505052 scopus 로고    scopus 로고
    • Efficient Unidirectional Proxy Re- Encryption
    • Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
    • Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient Unidirectional Proxy Re- Encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6055 , pp. 316-332
    • Chow, S.S.M.1    Weng, J.2    Yang, Y.3    Deng, R.H.4
  • 7
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Dodis, Y., Yampolskiy, A.: A Verifiable Random Function With Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 9
    • 52149099038 scopus 로고    scopus 로고
    • Tracing Malicious Proxies in Proxy Re-encryption
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Tracing Malicious Proxies in Proxy Re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332-353. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5209 , pp. 332-353
    • Libert, B.1    Vergnaud, D.2
  • 10
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 12
    • 67049100266 scopus 로고    scopus 로고
    • CCA-Secure Proxy Re-Encryption without Pairings
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Shao, J., Cao, Z.: CCA-Secure Proxy Re-Encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 13
    • 78651327986 scopus 로고    scopus 로고
    • CCA-Secure PRE Scheme without Random Oracles
    • Shao, J., Cao, Z., Liu, P.: CCA-Secure PRE Scheme without Random Oracles, Cryptology ePrint archive (2010), http://eprint.iacr.org/2010/112
    • (2010) Cryptology EPrint Archive
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 14
    • 77954643898 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    • De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
    • Sur, C., Jung, C.D., Park, Y., Rhee, K.H.: Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 214-232. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6109 , pp. 214-232
    • Sur, C.1    Jung, C.D.2    Park, Y.3    Rhee, K.H.4
  • 15
    • 78650288030 scopus 로고    scopus 로고
    • New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
    • Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. Springer, Heidelberg
    • Wang, L., Wang, L., Mambo, M., Okamoto, E.: New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6487 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 16
    • 79951651905 scopus 로고    scopus 로고
    • New CCA-secure Proxy Re-encryption Scheme without Random Oracles
    • Wang, X.A., Wei, P., Zhang, M.: New CCA-secure Proxy Re-encryption Scheme without Random Oracles. In: CIS 2010, pp. 377-381 (2010)
    • (2010) CIS 2010 , pp. 377-381
    • Wang, X.A.1    Wei, P.2    Zhang, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.