메뉴 건너뛰기




Volumn 7194 LNCS, Issue , 2012, Pages 404-421

Functional re-encryption and collusion-resistant obfuscation

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POLICIES; AUXILIARY INPUTS; AVERAGE-CASE; E-MAIL SERVERS; POLYNOMIAL-TIME; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION SCHEME; RE-ENCRYPTION; SECRET KEY;

EID: 84858329462     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28914-9_23     Document Type: Conference Paper
Times cited : (35)

References (27)
  • 1
    • 38049032820 scopus 로고    scopus 로고
    • How to Shuffle in Public
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Adida, B., Wikström, D.: How to Shuffle in Public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 555-574
    • Adida, B.1    Wikström, D.2
  • 2
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005 (2005)
    • (2005) NDSS 2005
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 4
    • 77957007880 scopus 로고    scopus 로고
    • On Strong Simulation and Composable Point Obfuscation
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Bitansky, N., Canetti, R.: On Strong Simulation and Composable Point Obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520-537. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 520-537
    • Bitansky, N.1    Canetti, R.2
  • 5
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 6
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 7
    • 84958626314 scopus 로고    scopus 로고
    • Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Canetti, R.: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 9
    • 0031624874 scopus 로고    scopus 로고
    • Perfectly one-way probabilistic hash functions
    • Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: STOC 1998, pp. 131-140 (1998)
    • (1998) STOC 1998 , pp. 131-140
    • Canetti, R.1    Micciancio, D.2    Reingold, O.3
  • 10
    • 77949622814 scopus 로고    scopus 로고
    • Obfuscation of Hyperplane Membership
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Canetti, R., Rothblum, G.N., Varia, M.: Obfuscation of Hyperplane Membership. In:Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 72-89. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 72-89
    • Canetti, R.1    Rothblum, G.N.2    Varia, M.3
  • 12
    • 34848837353 scopus 로고    scopus 로고
    • Correcting errors without leaking partial information
    • Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: STOC 2005, pp. 654-663 (2005)
    • (2005) STOC 2005 , pp. 654-663
    • Dodis, Y.1    Smith, A.2
  • 13
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169-178 (2009)
    • (2009) STOC 2009 , pp. 169-178
    • Gentry, C.1
  • 14
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Goldwasser, S., Kalai, Y.: On the impossibility of obfuscation with auxiliary input. In: FOCS 2005, pp. 553-562 (2005)
    • (2005) FOCS 2005 , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.2
  • 15
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: CCS 2006, pp. 89-98 (2006)
    • (2006) CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 77954654489 scopus 로고    scopus 로고
    • Secure Obfuscation for Encrypted Signatures
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Hada, S.: Secure Obfuscation for Encrypted Signatures. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 92-112. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 92-112
    • Hada, S.1
  • 18
    • 38049056625 scopus 로고    scopus 로고
    • Obfuscation for Cryptographic Purposes
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hofheinz,D.,Malone-Lee, J., Stam,M.:Obfuscation for Cryptographic Purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 214-232
    • Hofheinz, D.1    Malone-Lee, J.2    Stam, M.3
  • 19
    • 38049073133 scopus 로고    scopus 로고
    • Securely Obfuscating Re-encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 233-252
    • Hohenberger, S.1    Rothblum, G.N.2    Shelat, A.3    Vaikuntanathan, V.4
  • 21
    • 35048895442 scopus 로고    scopus 로고
    • Positive Results and Techniques for Obfuscation
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Lynn, B., Prabhakaran, M., Sahai, A.: Positive Results and Techniques for Obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 23
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 70350649061 scopus 로고    scopus 로고
    • Predicate Privacy in Encryption Systems
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Shen, E., Shi, E., Waters, B.: Predicate Privacy in Encryption Systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 26
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that xtr is more secure than supersingular elliptic curve Cryptosystems
    • Verheul, E.: Evidence that xtr is more secure than supersingular elliptic curve Cryptosystems. J. Cryptology 17(4), 277-296 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.1
  • 27
    • 33745541383 scopus 로고    scopus 로고
    • On obfuscating point functions
    • Wee, H.: On obfuscating point functions. In: STOC 2005, pp. 523-532 (2005)
    • (2005) STOC 2005 , pp. 523-532
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.