메뉴 건너뛰기




Volumn E-95-A, Issue 1, 2012, Pages 70-88

Identity-based proxy cryptosystems with revocability and hierarchical confidentialities

Author keywords

Hierarchical confidentialities; Proxy decryption; Proxy re encryption; Revocability

Indexed keywords

SECURITY OF DATA;

EID: 84855307392     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E95.A.70     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," EUROCRYPT 1998, LNCS, vol.1403, pp.127-144, Springer, 1998. (Pubitemid 128081481)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from theWeil pairing
    • Springer
    • D. Boneh and M. Franklin, "Identity-based encryption from theWeil pairing," CRYPTO 2001, LNCS, vol.2139, pp.213-229, Springer, 2001.
    • (2001) CRYPTO 2001, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Advances in Cryptology - CRYPTO 2001
    • R. Canetti and M. Fischlin, "Universally composable commitments," CRYPTO 2001, LNCS, vol.2139, pp.19-40, Springer, 2001. (Pubitemid 33317906)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 4
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Springer
    • R. Canetti, S. Halevi, and J. Katz, "Chosen-ciphertext security from identity-based encryption," EUROCRYPT 2004, LNCS, vol.3027, pp.207-222, Springer, 2004.
    • (2004) EUROCRYPT 2004, LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 5
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer
    • E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," CRYPTO 1999, LNCS, vol.1666, pp.537-554, Springer, 1999.
    • (1999) CRYPTO 1999, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 6
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Springer
    • C. Gentry, "Certificate-based encryption and the certificate revocation problem," EUROCRYPT 2003, LNCS, vol.2656, pp.272-293, Springer, 2003.
    • (2003) EUROCRYPT 2003, LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 7
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Springer
    • M. Green and G. Ateniese, "Identity-based proxy re-encryption," ACNS 2007, LNCS, vol.4521, pp.288-306, Springer, 2007.
    • (2007) ACNS 2007, LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 8
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
    • Jan.
    • M. Mambo and E. Okamoto, "Proxy cryptosystem: Delegation of the power to decrypt ciphertexts," IEICE Trans. Fundamentals, vol.E80-A, no.1, pp.54-63, Jan. 1997.
    • (1997) IEICE Trans. Fundamentals , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 9
    • 50049099260 scopus 로고    scopus 로고
    • Proxy re-encryption systems for identity-based encryption
    • Springer
    • T. Matsuo, "Proxy re-encryption systems for identity-based encryption," Pairing 2007, LNCS, vol.4575, pp.247-267, Springer, 2007.
    • (2007) Pairing 2007, LNCS , vol.4575 , pp. 247-267
    • Matsuo, T.1
  • 11
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPTO 1984, LNCS, vol.196, pp.47-53, Springer, 1985.
    • (1985) CRYPTO 1984, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 12
    • 38349068669 scopus 로고    scopus 로고
    • A certificate-based proxy cryptosystem with revocable proxy decryption power
    • Springer
    • L. Wang, J. Shao, Z. Cao, M. Mambo, and A. Yamamura, "A certificate-based proxy cryptosystem with revocable proxy decryption power," INDOCRYPT 2007, LNCS, vol.4859, pp.297-311, Springer, 2007.
    • (2007) INDOCRYPT 2007, LNCS , vol.4859 , pp. 297-311
    • Wang, L.1    Shao, J.2    Cao, Z.3    Mambo, M.4    Yamamura, A.5
  • 13
    • 78650889838 scopus 로고    scopus 로고
    • Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
    • Springer
    • L. Wang, L. Wang, M. Mambo, and E. Okamoto, "Identity-based proxy cryptosystems with revocability and hierarchical confidentialities," ICICS 2010, LNCS, vol.6476, pp.383-400, Springer, 2010.
    • (2010) ICICS 2010, LNCS , vol.6476 , pp. 383-400
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 14
    • 78650288030 scopus 로고    scopus 로고
    • New identitybased proxy re-encryption schemes to prevent collusion attacks
    • Springer
    • L. Wang, L. Wang, M. Mambo, and E. Okamoto, "New identitybased proxy re-encryption schemes to prevent collusion attacks," Pairing 2010, LNCS, vol.6487, pp.327-346, Springer, 2010.
    • (2010) Pairing 2010, LNCS , vol.6487 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 15
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters, "Efficient identity-based encryption without random oracles," EUROCRYPT 2005, LNCS, vol.3494, pp.114-127, Springer, 2005. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.