메뉴 건너뛰기




Volumn 7194 LNCS, Issue , 2012, Pages 75-93

Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions

Author keywords

adaptive corruptions; chosen ciphertext security; non interactivity; public key encryption; robustness; Threshold cryptography

Indexed keywords

ADAPTIVE CORRUPTIONS; CHOSEN CIPHERTEXT SECURITY; NON-INTERACTIVITY; PUBLIC-KEY ENCRYPTION; THRESHOLD CRYPTOGRAPHY;

EID: 84858324813     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28914-9_5     Document Type: Conference Paper
Times cited : (37)

References (54)
  • 1
    • 84957069963 scopus 로고    scopus 로고
    • Robust Distributed Multiplication without Interaction
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Abe, M.: Robust Distributed Multiplication without Interaction. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 130-147. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 130-147
    • Abe, M.1
  • 2
    • 33646833311 scopus 로고    scopus 로고
    • Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Abe, M., Fehr, S.: Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 317-334. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 317-334
    • Abe, M.1    Fehr, S.2
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS, pp. 62-73 (1993)
    • (1993) ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 79751527812 scopus 로고    scopus 로고
    • Batch Groth-Sahai
    • Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
    • Blazy, O., Fuchsbauer, G., Izabachène, M., Jambert, A., Sibert, H., Vergnaud, D.: Batch Groth-Sahai. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 218-235. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6123 , pp. 218-235
    • Blazy, O.1    Fuchsbauer, G.2    Izabachène, M.3    Jambert, A.4    Sibert, H.5    Vergnaud, D.6
  • 7
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 9
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM J. of Computing 32(3), 586-615 (2003);
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 0012970453 scopus 로고    scopus 로고
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
  • 12
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 13
    • 0002181960 scopus 로고
    • Digital Multisignatures
    • Beker, H.J., Piper, F.C. (eds.) Oxford University Press
    • Boyd, C.: Digital Multisignatures. In: Beker, H.J., Piper, F.C. (eds.) Cryptography and Coding, pp. 241-246. Oxford University Press (1989)
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 14
    • 33745767987 scopus 로고    scopus 로고
    • Direct Chosen Ciphertext Security from Identity-Based Techniques
    • Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: ACM CCS 2005, pp. 320-329 (2005)
    • (2005) ACM CCS 2005 , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 15
    • 84957083549 scopus 로고    scopus 로고
    • Adaptive Security for Threshold Cryptosystems
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive Security for Threshold Cryptosystems. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 98-115. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 98-115
    • Canetti, R.1    Gennaro, R.2    Jarecki, S.3    Krawczyk, H.4    Rabin, T.5
  • 16
    • 84957712291 scopus 로고    scopus 로고
    • An Efficient Threshold Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Canetti, R., Goldwasser, S.: An Efficient Threshold Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 90-106. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 17
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 18
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 19
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 20
    • 84957717648 scopus 로고    scopus 로고
    • Efficient Multiparty Computations Secure against an Adaptive Adversary
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 311-326. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 21
    • 21144458613 scopus 로고    scopus 로고
    • Share conversion, pseudorandom secret-sharing and applications to secure computation
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Cramer, R., Damgård, I., Ishai, Y.: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 342-362. Springer, Heidelberg (2005) (Pubitemid 41231173)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 342-362
    • Cramer, R.1    Damgard, I.2    Ishai, Y.3
  • 22
    • 85029541173 scopus 로고
    • Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Damgård, I.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445-456. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 445-456
    • Damgård, I.1
  • 23
    • 85032188633 scopus 로고
    • Society and Group Oriented Cryptography: A New Concept
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120-127. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 24
    • 85023809951 scopus 로고
    • Threshold Cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 25
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security of Multiple Encryption
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 26
    • 84946827596 scopus 로고    scopus 로고
    • Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Fouque, P.-A., Pointcheval, D.: Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 351-368. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 351-368
    • Fouque, P.-A.1    Pointcheval, D.2
  • 27
    • 84958045007 scopus 로고    scopus 로고
    • Adaptively-Secure Distributed Public-Key Systems
    • Nešetřil, J. (ed.) ESA 1999. Springer, Heidelberg
    • Frankel, Y., MacKenzie, P., Yung, M.: Adaptively-Secure Distributed Public-Key Systems. In: Nešetřil, J. (ed.) ESA 1999. LNCS, vol. 1643, pp. 4-27. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1643 , pp. 4-27
    • Frankel, Y.1    MacKenzie, P.2    Yung, M.3
  • 28
    • 84956868458 scopus 로고    scopus 로고
    • Adaptively-Secure Optimal-Resilience Proactive RSA
    • Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
    • Frankel, Y., MacKenzie, P., Yung, M.: Adaptively-Secure Optimal-Resilience Proactive RSA. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 180-195. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1716 , pp. 180-195
    • Frankel, Y.1    MacKenzie, P.2    Yung, M.3
  • 29
    • 77954639466 scopus 로고    scopus 로고
    • Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Freeman, D.M.: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 44-61
    • Freeman, D.M.1
  • 30
    • 77649262306 scopus 로고    scopus 로고
    • Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 444-459
    • Groth, J.1
  • 31
    • 33746072569 scopus 로고    scopus 로고
    • Perfect Non-interactive Zero Knowledge for NP
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Groth, J., Ostrovsky, R., Sahai, A.: Perfect Non-interactive Zero Knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 339-358
    • Groth, J.1    Ostrovsky, R.2    Sahai, A.3
  • 34
    • 70350302871 scopus 로고    scopus 로고
    • The Group of Signed Quadratic Residues and Applications
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: The Group of Signed Quadratic Residues and Applications. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 637-653. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 637-653
    • Hofheinz, D.1    Kiltz, E.2
  • 35
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
    • Extended Abstract. Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Jarecki, S., Lysyanskaya, A.: Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures (Extended Abstract). In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 221-242. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 36
    • 79953207657 scopus 로고    scopus 로고
    • Round-Optimal Password-Based Authenticated Key Exchange
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Round-Optimal Password-Based Authenticated Key Exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 293-310
    • Katz, J.1    Vaikuntanathan, V.2
  • 37
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Tag-Based Encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 38
    • 67650667958 scopus 로고    scopus 로고
    • A New Randomness Extraction Paradigm for Hybrid Encryption
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A New Randomness Extraction Paradigm for Hybrid Encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 590-609
    • Kiltz, E.1    Pietrzak, K.2    Stam, M.3    Yung, M.4
  • 39
    • 77949581448 scopus 로고    scopus 로고
    • New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 40
    • 79959977713 scopus 로고    scopus 로고
    • Adaptively Secure Non-interactive Threshold Cryptosystems
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
    • Libert, B., Yung, M.: Adaptively Secure Non-interactive Threshold Cryptosystems. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 588-600. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6756 , pp. 588-600
    • Libert, B.1    Yung, M.2
  • 41
    • 26444507178 scopus 로고    scopus 로고
    • An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • MacKenzie, P.: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 47-61. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 47-61
    • MacKenzie, P.1
  • 42
    • 30744458170 scopus 로고    scopus 로고
    • Alternatives to Non-malleability: Definitions, Constructions, and Applications
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • MacKenzie, P., Reiter, M.K., Yang, K.: Alternatives to Non-malleability: Definitions, Constructions, and Applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 171-190. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 171-190
    • MacKenzie, P.1    Reiter, M.K.2    Yang, K.3
  • 43
    • 79953188689 scopus 로고    scopus 로고
    • Signatures Resilient to Continual Leakage on Memory and Computation
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Malkin, T., Teranishi, I., Vahlis, Y., Yung, M.: Signatures Resilient to Continual Leakage on Memory and Computation. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 89-106. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 89-106
    • Malkin, T.1    Teranishi, I.2    Vahlis, Y.3    Yung, M.4
  • 44
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990. ACM Press (1990)
    • (1990) STOC 1990
    • Naor, M.1    Yung, M.2
  • 46
    • 84974554584 scopus 로고
    • Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 47
    • 0033342534 scopus 로고    scopus 로고
    • Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
    • Sahai, A.: Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. In: FOCS 1999, pp. 543-553 (1999)
    • (1999) FOCS 1999 , pp. 543-553
    • Sahai, A.1
  • 48
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
    • Report 2002/164
    • Scott, M.: Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number. Cryptology ePrint Archive: Report 2002/164
    • Cryptology ePrint Archive
    • Scott, M.1
  • 49
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 50
    • 1842599265 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems against Chosen Ciphertext Attack
    • Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. J. of Cryptology 15(2), 75-96 (2002).
    • (2002) J. of Cryptology , vol.15 , Issue.2 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2
  • 51
    • 84858300751 scopus 로고    scopus 로고
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 1-16
  • 52
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 53
    • 77957000385 scopus 로고    scopus 로고
    • Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Wee, H.: Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 314-332
    • Wee, H.1
  • 54
    • 79958014514 scopus 로고    scopus 로고
    • Threshold and Revocation Cryptosystems via Extractable Hash Proofs
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Wee, H.: Threshold and Revocation Cryptosystems via Extractable Hash Proofs. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 589-609. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 589-609
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.