메뉴 건너뛰기




Volumn 5, Issue 5, 2012, Pages 439-449

Anonymous proxy re-encryption

Author keywords

Anonymity; Chosen ciphertext security; Collusion resistance; Proxy re encryption; Random oracle model

Indexed keywords

FILE ORGANIZATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84859918931     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.326     Document Type: Article
Times cited : (33)

References (27)
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Springer: Heidelberg
    • Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In EUROCRYPT 1998, LNCS, Vol. 1403. Springer: Heidelberg, 1998; 127-144.
    • (1998) EUROCRYPT 1998, LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Springer: Heidelberg, Full version: Cryptology ePrint Archieve: Report 2006/473.
    • Green M, Ateniese G. Identity-based proxy re-encryption. In ACNS 2007, LNCS, Vol. 4521. Springer: Heidelberg, 2007; 288-306. Full version: Cryptology ePrint Archieve: Report 2006/473.
    • (2007) ACNS 2007, LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 7
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • ACM New York, NY, USA. Full version: Cryptology ePrint Archieve: Report 2007/171.
    • Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In ACM CCS 2007, 2007; 185-194. ACM New York, NY, USA. Full version: Cryptology ePrint Archieve: Report 2007/171.
    • (2007) ACM CCS 2007 , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 8
    • 77952369970 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption schemes without pairings
    • Springer: Heidelberg
    • Weng J, Deng RH, Liu S, Chen K, Lai J, Wang X. Chosen-ciphertext secure proxy re-encryption schemes without pairings. In CANS 2008, LNCS, Vol. 5339. Springer: Heidelberg, 2008; 1-17.
    • (2008) CANS 2008, LNCS , vol.5339 , pp. 1-17
    • Weng, J.1    Deng, R.H.2    Liu, S.3    Chen, K.4    Lai, J.5    Wang, X.6
  • 9
    • 67049100266 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Springer: Heidelberg
    • Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In PKC 2009, LNCS, Vol. 5443. Springer: Heidelberg, 2009; 357-376.
    • (2009) PKC 2009, LNCS , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 10
    • 77953505052 scopus 로고    scopus 로고
    • Efficient unidirectional proxy re-encryption
    • Springer: Heidelberg, Full version:
    • Chow S, Weng J, Yang Y, Deng R. Efficient unidirectional proxy re-encryption. In Africacrypt 2010, LNCS, Vol. 6055. Springer: Heidelberg, 2010; 316-332. Full version:
    • (2010) Africacrypt 2010, LNCS , vol.6055 , pp. 316-332
    • Chow, S.1    Weng, J.2    Yang, Y.3    Deng, R.4
  • 11
    • 67650135696 scopus 로고    scopus 로고
    • Key-private proxy re-encryption
    • Springer: Heidelberg
    • Ateniese G, Benson K, Hohenberger S. Key-private proxy re-encryption. In RSA 2009, LNCS, Vol. 5473. Springer: Heidelberg, 2009; 279-294.
    • (2009) RSA 2009, LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 12
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Springer: Heidelberg
    • Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In PKC 2008, LNCS, Vol. 4939. Springer: Heidelberg, 2008; 360-379.
    • (2008) PKC 2008, LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 13
    • 77952322019 scopus 로고    scopus 로고
    • CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    • Updated version:
    • Weng J, Chen M, Yang Y, Deng R, Chen K, Bao F. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Science China Information Sciences 2010; 53(3): 593- 606. Updated version:
    • (2010) Science China Information Sciences , vol.53 , Issue.3 , pp. 593-606
    • Weng, J.1    Chen, M.2    Yang, Y.3    Deng, R.4    Chen, K.5    Bao, F.6
  • 14
    • 79251541771 scopus 로고    scopus 로고
    • SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
    • Shao J, Cao Z, Liu P. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks 2011; 4(2): 122-135.
    • (2011) Security and Communication Networks , vol.4 , Issue.2 , pp. 122-135
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 15
    • 84947618831 scopus 로고    scopus 로고
    • CCA-secure PRE scheme without random oracles; Cryptology ePrint Archive
    • Shao J, Cao Z, Liu P. CCA-secure PRE scheme without random oracles; Cryptology ePrint Archive
    • Shao, J.1    Cao, Z.2    Liu, P.3
  • 17
  • 18
    • 78249237546 scopus 로고    scopus 로고
    • CCA-secure type-based proxy re-encryption with invisible proxy
    • Bradford, West Yorkshire, UK
    • Jia X, Shao J, Jing J, Liu P. CCA-secure type-based proxy re-encryption with invisible proxy. In IEEE CIT 2010, Bradford, West Yorkshire, UK, 2010; 1299-1305.
    • (2010) IEEE CIT 2010 , pp. 1299-1305
    • Jia, X.1    Shao, J.2    Jing, J.3    Liu, P.4
  • 20
    • 0000537828 scopus 로고    scopus 로고
    • Efficient identifications and signatures for smart cards
    • Springer: Heidelberg
    • Schnorr C. Efficient identifications and signatures for smart cards. In CRYPTO 1998, LNCS, Vol. 435. Springer: Heidelberg, 1998; 239-251.
    • (1998) CRYPTO 1998, LNCS , vol.435 , pp. 239-251
    • Schnorr, C.1
  • 21
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31(4): 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 22
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer: Heidelberg
    • Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO 1999, LNCS, Vol. 1666. Springer: Heidelberg, 1999; 537-554.
    • (1999) CRYPTO 1999, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 24
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer: Heidelberg
    • Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO 1998, LNCS, Vol. 1462. Springer: Heidelberg, 1998; 13-25.
    • (1998) CRYPTO 1998, LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 25
    • 34548774576 scopus 로고    scopus 로고
    • Multi-dimensional range query over encrypted data
    • Claremont Resort, Berkeley, CA, USA
    • Shi E, Bethencourt J, Chan HTH, Song D, Perrig A. Multi-dimensional range query over encrypted data. In S & P 2007, Claremont Resort, Berkeley, CA, USA, 2007; 350-364.
    • (2007) S & P 2007 , pp. 350-364
    • Shi, E.1    Bethencourt, J.2    Chan, H.T.H.3    Song, D.4    Perrig, A.5
  • 26
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
    • Springer: Heidelberg
    • Kiltz E. Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman. In PKC 2007, LNCS, Vol. 4450. Springer: Heidelberg, 2007; 282-297.
    • (2007) PKC 2007, LNCS , vol.4450 , pp. 282-297
    • Kiltz, E.1
  • 27
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • ACM New York, NY, USA
    • Gentry C. Fully homomorphic encryption using ideal lattices. In ACM STOC 2009. ACM New York, NY, USA, 2009; 169-178.
    • (2009) ACM STOC 2009 , pp. 169-178
    • Gentry, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.