메뉴 건너뛰기




Volumn 7293 LNCS, Issue , 2012, Pages 225-242

Outsider-anonymous broadcast encryption with sublinear ciphertexts

Author keywords

Anonymous IBE; Broadcast Encryption; Recipient Privacy; Subset Cover Framework

Indexed keywords

ANONYMOUS IBE; BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; CIPHERTEXTS; DIFFIE-HELLMAN ASSUMPTION; GENERIC CONSTRUCTION; RANDOM ORACLE MODEL; STANDARD SETTING; SUBLINEAR; SUBSET COVER FRAMEWORK; THE STANDARD MODEL;

EID: 84861665813     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30057-8_14     Document Type: Conference Paper
Times cited : (68)

References (30)
  • 1
    • 85030481487 scopus 로고
    • How to Broadcast a Secret
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535-541. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 535-541
    • Berkovits, S.1
  • 2
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 5
    • 84974588069 scopus 로고    scopus 로고
    • Long-Lived Broadcast Encryption
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Garay, J.A., Staddon, J., Wool, A.: Long-Lived Broadcast Encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 333-352
    • Garay, J.A.1    Staddon, J.2    Wool, A.3
  • 6
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001) (Pubitemid 33317907)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 7
    • 84937435227 scopus 로고    scopus 로고
    • The LSD Broadcast Encryption Scheme
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 8
    • 35248901924 scopus 로고    scopus 로고
    • Public Key Broadcast Encryption for Stateless Receivers
    • Feigenbaum, J. (ed.) DRM 2002. Springer, Heidelberg
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 10
    • 1142293090 scopus 로고    scopus 로고
    • Scalable public-key tracing and revoking
    • Invited to the PODC 2003 Special Issue of Journal of Distributed Computing
    • Dodis, Y., Fazio, N., Kiayias, A., Yung, M.: Scalable public-key tracing and revoking. In: Principles of Distributed Computing - PODC 2003, pp. 190-199 (2003); Invited to the PODC 2003 Special Issue of Journal of Distributed Computing
    • (2003) Principles of Distributed Computing - PODC 2003 , pp. 190-199
    • Dodis, Y.1    Fazio, N.2    Kiayias, A.3    Yung, M.4
  • 11
    • 14844297376 scopus 로고    scopus 로고
    • ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
    • Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: ACM Computer and Communications Security - CCS 2004, pp. 354-363 (2004)
    • (2004) ACM Computer and Communications Security - CCS 2004 , pp. 354-363
    • Yao, D.1    Fazio, N.2    Dodis, Y.3    Lysyanskaya, A.4
  • 14
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 17
    • 33845921868 scopus 로고    scopus 로고
    • A Revocation Scheme Preserving Privacy
    • Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. Springer, Heidelberg
    • Krzywiecki, Ł., Kubiak, P., Kutyłowski, M.: A Revocation Scheme Preserving Privacy. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 130-143. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4318 , pp. 130-143
    • Krzywiecki, Ł.1    Kubiak, P.2    Kutyłowski, M.3
  • 19
    • 38049060325 scopus 로고    scopus 로고
    • Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 270-287
    • Jarecki, S.1    Liu, X.2
  • 20
    • 33745134401 scopus 로고    scopus 로고
    • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone- Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone- Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 21
    • 33746062799 scopus 로고    scopus 로고
    • Practical Identity-Based Encryption Without Random Oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 22
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 23
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 24
    • 35048835319 scopus 로고    scopus 로고
    • Secure Identity Based EncryptionWithout Random Oracles
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Secure Identity Based EncryptionWithout Random Oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 26
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 28
    • 77949593967 scopus 로고    scopus 로고
    • Robust Encryption
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Neven, G.: Robust Encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480-497. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 480-497
    • Abdalla, M.1    Bellare, M.2    Neven, G.3
  • 29
    • 84861665813 scopus 로고    scopus 로고
    • Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225-242. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 225-242
    • Fazio, N.1    Perera, I.M.2
  • 30
    • 44449176564 scopus 로고    scopus 로고
    • The Twin Diffie-Hellman Problem and Applications
    • Smart, N. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.