메뉴 건너뛰기




Volumn 55, Issue 4, 2012, Pages 439-446

Improved anonymous multi-receiver identity-based encryption

Author keywords

anonymity; cryptography; encryption; multicast; pairing

Indexed keywords

ANONYMITY; COMPUTATIONAL PERFORMANCE; DESIGNATED RECEIVERS; ENCRYPTED MESSAGES; IDENTITY BASED ENCRYPTION; IMPROVED SCHEME; MULTI-RECEIVER; MULTICASTS; PAIRING;

EID: 84859322276     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr086     Document Type: Article
Times cited : (49)

References (21)
  • 1
    • 20444502239 scopus 로고    scopus 로고
    • An Id-based broadcast encryption scheme for key distribution
    • Du, X., Wang, Y., Ge, J. and Wang, Y. (2005) An Id-based broadcast encryption scheme for key distribution. IEEE Trans. Broadcast., 51, 264-266.
    • (2005) IEEE Trans. Broadcast. , vol.51 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 2
    • 36348947024 scopus 로고    scopus 로고
    • Comments on an efficient ID-based broadcast encryption scheme
    • Chien, H.Y. (2007) Comments on an efficient ID-based broadcast encryption scheme. IEEE Trans. Broadcast., 53, 809-810.
    • (2007) IEEE Trans. Broadcast. , vol.53 , pp. 809-810
    • Chien, H.Y.1
  • 3
    • 33745622143 scopus 로고    scopus 로고
    • Efficient pubic key broadcast encryption using identifier of receivers
    • 2006, Hangzhou, China. Lecture Notes in Computer Science 3903, Springer
    • Lee, J.W., Hwang,Y.H. and Lee, P.J. (2006) Efficient Pubic Key Broadcast Encryption Using Identifier of Receivers. ISPEC 2006, Hangzhou, China. Lecture Notes in Computer Science 3903, pp. 153-164. Springer.
    • (2006) ISPEC , pp. 153-164
    • Lee, J.W.1    Hwang, Y.H.2    Lee, P.J.3
  • 4
    • 33750089267 scopus 로고    scopus 로고
    • A new id-based broadcast encryption scheme
    • 2006, Wuhan, China. Lecture Notes in Computer Science 4158, Springer
    • Yang, C., Cheng, X., Ma, W. and Wang, X. (2006) A New Id-Based Broadcast Encryption Scheme. Autonomic and Trusted Computing 2006, Wuhan, China. Lecture Notes in Computer Science 4158, pp. 487-492. Springer.
    • (2006) Autonomic and Trusted Computing , pp. 487-492
    • Yang, C.1    Cheng, X.2    Ma, W.3    Wang, X.4
  • 5
    • 29144440106 scopus 로고    scopus 로고
    • Efficient identity-based multicast scheme from bilinear pairing
    • Wang, L. andWu, C.-K. (2005) Efficient identity-based multicast scheme from bilinear pairing. IEE Proc. Commun., 152, 877-882.
    • (2005) IEE Proc. Commun. , vol.152 , pp. 877-882
    • Wang, L.1    Wu, C.-K.2
  • 6
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • 2005, Switzerland. Lecture Notes in Computer Science 3386
    • Baek, J., Safavi-Naini, R. and Susilo, W. (2005) Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PKC 2005, Switzerland. Lecture Notes in Computer Science 3386, pp. 380-397.
    • (2005) PKC , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 7
    • 66149159191 scopus 로고    scopus 로고
    • Pairing-based multi-recipient public key encryption
    • Las Vegas, Nevada, USA.
    • Lu, L. and Hu, L. (2006) Pairing-Based Multi-Recipient Public Key Encryption. Proc. 2006 Int. Conf. Security & Management, Las Vegas, Nevada, USA. pp. 159-165.
    • (2006) Proc. 2006 Int. Conf. Security & Management , pp. 159-165
    • Lu, L.1    Hu, L.2
  • 8
    • 85025586099 scopus 로고    scopus 로고
    • Multi-Receiver identity-based key encapsulation with shortened ciphertext
    • Kolkata, India. Lecture Notes in Computer Science 4329, Springer
    • Chatterjee, S. and Sarkar, P. (2006) Multi-Receiver Identity-Based Key Encapsulation with Shortened Ciphertext. INDOCRYPT 2006, Kolkata, India. Lecture Notes in Computer Science 4329, pp. 394-408. Springer.
    • (2006) INDOCRYPT , vol.2006 , pp. 394-408
    • Chatterjee, S.1    Sarkar, P.2
  • 9
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Fan, D., Huang, L.Y. and Ho, P.H. (2010) Anonymous multireceiver identity-based encryption. IEEE Trans. Comput., 2010, http://doi. ieeecomputersociety.org/10.1109/TC.2010.23.
    • (2010) IEEE Trans. Comput. , vol.2010
    • Fan, D.1    Huang, L.Y.2    Ho, P.H.3
  • 10
    • 84859296222 scopus 로고    scopus 로고
    • Eltahawy Mona. Tunisia's Jasmine Revolution.Washington Post. 2011-01-15 [2011-01-15]. (accessed April 18, 2011)
    • Eltahawy, Mona. Tunisia's Jasmine Revolution.Washington Post. 2011-01-15 [2011-01-15]. http://www.washingtonpost.com/ wp-dyn/content/article/2011/01/14/ AR2011011405084.html (accessed April 18, 2011).
  • 11
    • 85020598353 scopus 로고
    • Identity based on cryptosystems and signature schemes
    • Barbara, California, USA. Lecture Notes in Computer Science 196, Springer
    • Shamir,A. (1984) Identity Based on Cryptosystems and Signature Schemes. Crypto'84, Barbara, California, USA. Lecture Notes in Computer Science 196, pp. 47-53. Springer.
    • (1984) Crypto'84 , pp. 47-53
    • Shamir, A.1
  • 12
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M. (2003) Identity-based encryption from the weil pairing. SIAM J. Comput., 32, 586-615.
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 13
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without
    • 2006, Saint Petersburg, Russia. Lecture Notes in Computer Science 4004
    • Gentry, C. (2006) Practical Identity-Based Encryption Without Random Oracles. Advances in Cryptology -EUROCRYPT 2006, Saint Petersburg, Russia. Lecture Notes in Computer Science 4004, pp. 445-464.
    • (2006) Random Oracles. Advances in Cryptology -EUROCRYPT , pp. 445-464
    • Gentry, C.1
  • 15
    • 84983062295 scopus 로고    scopus 로고
    • An ID-based anonymous signcryption scheme for multiple receivers
    • Zhang, B. and Xu, Q. (2010) An ID-based anonymous signcryption scheme for multiple receivers. Int. J. Adv. Sci. Technol., 20, 9-24.
    • (2010) Int. J. Adv. Sci. Technol. , vol.20 , pp. 9-24
    • Zhang, B.1    Xu, Q.2
  • 16
    • 78651545720 scopus 로고    scopus 로고
    • Efficient ID-based secure encryption scheme for anonymous receivers
    • Wang, X.,Wang, A.-L. andWang L.Y. (2009) Efficient ID-based secure encryption scheme for anonymous receivers. J. Netw., 4, 641-648.
    • (2009) J. Netw. , vol.4 , pp. 641-648
    • Wang, X.1    Wang, A.-L.2    Wang, L.Y.3
  • 17
    • 74049086556 scopus 로고    scopus 로고
    • Efficient privacy of message encryption algorithm for anonymous receivers in E-commerce
    • Tianjin, China.
    • Xu, X.-Y. (2009) Efficient Privacy of Message Encryption Algorithm for Anonymous Receivers in E-commerce. Proc. 2nd Int. Conf. Biomedical Engineering and Informatics 2009, Tianjin, China. pp. 1-4.
    • (2009) Proc. 2nd Int. Conf. Biomedical Engineering and Informatics , vol.2009 , pp. 1-4
    • Xu, X.-Y.1
  • 18
    • 24144434019 scopus 로고    scopus 로고
    • Fast and proven secure blind identity-based signcryption from pairings
    • San Francisco, CA, USA. Lecture Notes in Computer Science 3376
    • Yuen, T.H. and Wei, V.K. (2005) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. CT-RSA 2005, San Francisco, CA, USA. Lecture Notes in Computer Science 3376, pp. 305-322.
    • (2005) CT-RSA , vol.2005 , pp. 305-322
    • Yuen, T.H.1    Wei, V.K.2
  • 19
    • 46749107236 scopus 로고    scopus 로고
    • Selectively convertible authenticated encryption in the random oracle model
    • Chien, H.-Y. (2008) Selectively convertible authenticated encryption in the random oracle model. Comput. J., 51, 419-434.
    • (2008) Comput. J. , vol.51 , pp. 419-434
    • Chien, H.-Y.1
  • 20
    • 33847698965 scopus 로고    scopus 로고
    • Efficient pairing computation on supersingular abelian varieties
    • Cryptology ePrint Archive: Report 2004/375
    • Barreto, P.S.L.M., Galbraith, S., O'hEigeartaigh, C. and Scott, M. (2007) Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptogr., 42, 239-271; Cryptology ePrint Archive: Report 2004/375.
    • (2007) Des. Codes Cryptogr. , vol.42 , pp. 239-271
    • Barreto, P.S.L.M.1    Galbraith, S.2    O'hEigeartaigh, C.3    Scott, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.