메뉴 건너뛰기




Volumn 13, Issue 4, 2012, Pages 296-303

Privacy-preserving identity-based broadcast encryption

Author keywords

Broadcast encryption; Hidden receiver; Identity based encryption; Privacy

Indexed keywords

AUTHORIZED USERS; BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; BROADCAST MESSAGES; BROADCAST RECEIVERS; COMPUTATION COSTS; IDENTITY BASED ENCRYPTION; IDENTITY-BASED; PRIVACY PRESERVING; USER PRIVACY;

EID: 84861593834     PISSN: 15662535     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.inffus.2011.03.003     Document Type: Article
Times cited : (57)

References (26)
  • 2
    • 0001720832 scopus 로고    scopus 로고
    • Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
    • PII S0304397597000024
    • C. Blundo, Luiz A. Frota Mattos, and D.R. Stinson Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution Theoretical Computer Science 200 1998 313 334 (Pubitemid 128450821)
    • (1998) Theoretical Computer Science , vol.200 , Issue.1-2 , pp. 313-334
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 3
    • 0005053804 scopus 로고    scopus 로고
    • Some new results on key distribution patterns and broadcast encryption
    • D.R. Stinson, and T.V. Trung Some new results on key distribution patterns and broadcast encryption Designs, Codes and Cryptography 14 1998 261 279 (Pubitemid 128507645)
    • (1998) Designs, Codes, and Cryptography , vol.14 , Issue.3 , pp. 261-279
    • Stinson, D.R.1    Van Trung, T.2
  • 4
    • 0034238689 scopus 로고    scopus 로고
    • Key management for restricted multicast using broadcast encryption
    • M. Abdalla, Y. Shavitt, and A. Wool Key management for restricted multicast using broadcast encryption IEEE/ACM Transactions on Networking 8 2000 443 454
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , pp. 443-454
    • Abdalla, M.1    Shavitt, Y.2    Wool, A.3
  • 5
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • J. Baek, R. Safavi-Naini, W. Susilo, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, in: Proc. PKC 2005, LNCS 3386, 2005, pp. 23-26.
    • (2005) Proc. PKC 2005, LNCS 3386 , pp. 23-26
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: Proc. CRYPTO 2001, LNCS 2139, 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes In Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 85025586099 scopus 로고    scopus 로고
    • Multi-receiver identity-based key encapsulation with shortened ciphertext
    • S. Chatterjee, P. Sarkar, Multi-receiver identity-based key encapsulation with shortened ciphertext, in: Proc. INDOCRYPT 2006, LNCS 4329, 2006, pp. 394-408.
    • (2006) Proc. INDOCRYPT 2006, LNCS 4329 , pp. 394-408
    • Chatterjee, S.1    Sarkar, P.2
  • 9
    • 38049061158 scopus 로고    scopus 로고
    • Generalized key delegation for hierarchical identity-based encryption
    • M. Abdalla, E. Kiltz, G. Neven, Generalized key delegation for hierarchical identity-based encryption, in: Proc. ESORICS 2005, LNCS 4734, 2005, pp. 139-154.
    • (2005) Proc. ESORICS 2005, LNCS 4734 , pp. 139-154
    • Abdalla, M.1    Kiltz, E.2    Neven, G.3
  • 10
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with cosntant size ciphertexts and private keys
    • C. Delerablee, Identity-based broadcast encryption with cosntant size ciphertexts and private keys, in: Proc. ASIACRYPT 2007, LNCS 4833, 2007, pp. 200-215.
    • (2007) Proc. ASIACRYPT 2007, LNCS 4833 , pp. 200-215
    • Delerablee, C.1
  • 11
    • 62649173578 scopus 로고    scopus 로고
    • Fully CCA2 secure identity-based broadcast encryption without random oracles
    • Y. Ren, and D. Gu Fully CCA2 secure identity-based broadcast encryption without random oracles Information Processing Letters 109 2009 527 533
    • (2009) Information Processing Letters , vol.109 , pp. 527-533
    • Ren, Y.1    Gu, D.2
  • 16
    • 22144445920 scopus 로고    scopus 로고
    • The weil pairing, and its efficient calculation
    • DOI 10.1007/s00145-004-0315-8
    • V.S. Miller The weil pairing and its efficient calculation Journal of Cryptology 17 2004 235 261 (Pubitemid 41201458)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.S.1
  • 17
    • 23944466280 scopus 로고    scopus 로고
    • Implementation of tate pairing on hyperelliptic curves of genus 2
    • Y.J. Choie, E. Lee, Implementation of tate pairing on hyperelliptic curves of genus 2, in: Proc. ICISC 2003, LNCS 2971, 2004, pp. 97-111.
    • (2004) Proc. ICISC 2003, LNCS 2971 , pp. 97-111
    • Choie, Y.J.1    Lee, E.2
  • 18
    • 33748598990 scopus 로고    scopus 로고
    • An efficient identity-based cryptosystem for end-to-end mobile security
    • DOI 10.1109/TWC.2006.1687783, 1687783
    • J. Hwu, R. Chen, and Y. Lin An efficient identity-based cryptosystem for end-to-end mobile security IEEE Transactions on Wireless Communications 5 2006 2586 2593 (Pubitemid 44376172)
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2586-2593
    • Hwu, J.-S.1    Chen, R.-J.2    Lin, Y.-B.3
  • 19
    • 38049087403 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • A. Barth, D. Boneh, B. Waters, Privacy in encrypted content distribution using private broadcast encryption, in: Proc. Financial Cryptography, 2006.
    • (2006) Proc. Financial Cryptography
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 20
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli, and D. Hutchison A survey of key management for secure group communication ACM Computing Surveys 35 2003 309 329
    • (2003) ACM Computing Surveys , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 22
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multi-receiver identity-based encryption
    • 1239-124
    • C. Fan, L. Huang, and P. Ho Anonymous multi-receiver identity-based encryption IEEE Transactions on Computers 59 2010 1239-124
    • (2010) IEEE Transactions on Computers , vol.59
    • Fan, C.1    Huang, L.2    Ho, P.3
  • 25
    • 84861613165 scopus 로고    scopus 로고
    • accessed 1.04.10
    • Search for Digital IDs (VeriSign). < https://digitalid.verisign.com/ services/client/index.html > (accessed 1.04.10).
    • Search for Digital IDs (VeriSign)
  • 26
    • 84861613167 scopus 로고    scopus 로고
    • accessed 1.04.10
    • File Encryption (Windows), Microsoft, < http://msdn.microsoft.com/en- us/library/aa364223%28VS.85%29.aspx > (accessed 1.04.10).
    • File Encryption (Windows), Microsoft


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.