메뉴 건너뛰기




Volumn 85, Issue 3, 2012, Pages 708-716

Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority

Author keywords

Accountability; Black box traceability; Identity based broadcast encryption

Indexed keywords

ACCOUNTABILITY; ADAPTIVE ADVERSARY; BLACK BOX TRACING; BLACK BOXES; BLACK-BOX TRACEABILITY; BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; CIPHERTEXTS; DECRYPTION KEYS; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; PRIVATE KEY; PRIVATE KEY GENERATORS; PUBLIC KEYS;

EID: 84857361360     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.09.045     Document Type: Article
Times cited : (21)

References (26)
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • D. Boneh, X. Boyen, and E. Goh Hierarchical identity based encryption with constant size ciphertext EUROCRYPT 2005, vol. 3493 of Lecture Notes in Computer Science 2005 Springer-Verlag 440 456 (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science 2001 Springer-Verlag 213 229 (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM Journal of Computing 32 3 2003 586 615
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 10
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • D. Boneh, and J. Katz Improved efficiency for cca-secure cryptosystems built using identity based encryption CT-RSA 2005, vol. 3376 of Lecture Notes in Computer Science 2005 Springer-Verlag 87 103 (Pubitemid 41235422)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 12
    • 67049154036 scopus 로고    scopus 로고
    • Removing escrow from identity-based encryption
    • S. Jarecki, G. Tsudik, Springer-Verlag
    • S.S.M. Chow Removing escrow from identity-based encryption S. Jarecki, G. Tsudik, PKC 2009, vol. 5443 of Lecture Notes in Computer Science 2009 Springer-Verlag 256 276
    • (2009) PKC 2009, Vol. 5443 of Lecture Notes in Computer Science , pp. 256-276
    • Chow, S.S.M.1
  • 13
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Springer-Verlag
    • C. Delerablée Identity-based broadcast encryption with constant size ciphertexts and private keys ASIACRYPT 2007, vol. 4833 of Lecture Notes in Computer Science 2007 Springer-Verlag 200 215
    • (2007) ASIACRYPT 2007, Vol. 4833 of Lecture Notes in Computer Science , pp. 200-215
    • Delerablée, C.1
  • 14
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • E. Biham, Springer-Verlag
    • C. Gentry Certificate-based encryption and the certificate revocation problem E. Biham, EUROCRYPT 2003, vol. 2656 of Lecture Notes in Computer Science 2003 Springer-Verlag 272 293
    • (2003) EUROCRYPT 2003, Vol. 2656 of Lecture Notes in Computer Science , pp. 272-293
    • Gentry, C.1
  • 18
    • 70349289356 scopus 로고    scopus 로고
    • Black-box accountable authority identity based encryption
    • V. Goyal, S. Lu, A. Sahai, and B. Waters Black-box accountable authority identity based encryption ACM-CCS 2008 2008 427 436
    • (2008) ACM-CCS 2008 , pp. 427-436
    • Goyal, V.1    Lu, S.2    Sahai, A.3    Waters, B.4
  • 19
    • 58349096483 scopus 로고    scopus 로고
    • Identity-based broadcast encryption scheme with untrusted pkg
    • IEEE Computer Society
    • S. Guo, and C. Zhang Identity-based broadcast encryption scheme with untrusted pkg ICYCS 2008 2008 IEEE Computer Society 1613 1618
    • (2008) ICYCS 2008 , pp. 1613-1618
    • Guo, S.1    Zhang, C.2
  • 20
    • 84988273293 scopus 로고    scopus 로고
    • Multi-authority ciphertext-policy attribute-based encryption with accountability
    • ACM New York, NY, USA
    • J. Li, Q. Huang, X. Chen, S.S.M. Chow, D.S. Wong, and D. Xie Multi-authority ciphertext-policy attribute-based encryption with accountability ASIACCS 2011 2011 ACM New York, NY, USA 386 390
    • (2011) ASIACCS 2011 , pp. 386-390
    • Li, J.1    Huang, Q.2    Chen, X.3    Chow, S.S.M.4    Wong, D.S.5    Xie, D.6
  • 21
    • 67049119914 scopus 로고    scopus 로고
    • Towards black-box accountable authority IBE with short ciphertexts and private keys
    • Springer-Verlag
    • B. Libert, and D. Vergnaud Towards black-box accountable authority IBE with short ciphertexts and private keys PKC 2009, vol. 5443 of Lecture Notes in Computer Science 2009 Springer-Verlag 235 255 http://www.dice.ucl.ac.be/~libert/ accountable-IBE-full.pdf
    • (2009) PKC 2009, Vol. 5443 of Lecture Notes in Computer Science , pp. 235-255
    • Libert, B.1    Vergnaud, D.2
  • 22
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai, and B. Waters Fuzzy identity-based encryption EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science 2005 Springer-Verlag 457 473 (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 26
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters Efficient identity-based encryption without random oracles EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science 2005 Springer-Verlag 114 127 (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.