메뉴 건너뛰기




Volumn 7293 LNCS, Issue , 2012, Pages 206-224

Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model

Author keywords

Anonymity; Broadcast Encryption

Indexed keywords

ADAPTIVE SECURITY; ANONYMITY; ANONYMOUS BROADCAST; BROADCAST ENCRYPTION; CIPHERTEXTS; COMMUNICATION COST; CRYPTOGRAPHIC PRIMITIVES; DECRYPTION PROCESS; EFFICIENT CONSTRUCTION; GENERIC CONSTRUCTION; IND-CCA; PUBLIC-KEY ENCRYPTION; SECURITY DEFINITIONS; SECURITY NOTION; THE STANDARD MODEL;

EID: 84861702751     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30057-8_13     Document Type: Conference Paper
Times cited : (121)

References (34)
  • 2
    • 77949593967 scopus 로고    scopus 로고
    • Robust Encryption
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Neven, G.: Robust Encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480-497. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 480-497
    • Abdalla, M.1    Bellare, M.2    Neven, G.3
  • 3
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005) (Pubitemid 41313950)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 4
    • 38149004763 scopus 로고    scopus 로고
    • Randomness Reuse: Extensions and Improvements
    • Galbraith, S.D. (ed.) Cryptography and Coding 2007. Springer, Heidelberg
    • Barbosa, M., Farshim, P.: Randomness Reuse: Extensions and Improvements. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 257-276. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4887 , pp. 257-276
    • Barbosa, M.1    Farshim, P.2
  • 6
    • 84946837370 scopus 로고    scopus 로고
    • Key-Privacy in Public-Key Encryption
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 7
    • 36348998232 scopus 로고    scopus 로고
    • Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security
    • Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security. IEEE Trans. on Information Theory 53(11), 3927-3943 (2007)
    • (2007) IEEE Trans. on Information Theory , vol.53 , Issue.11 , pp. 3927-3943
    • Bellare, M.1    Boldyreva, A.2    Kurosawa, K.3    Staddon, J.4
  • 10
    • 58349086247 scopus 로고    scopus 로고
    • Generalized Identity Based and Broadcast Encryption Schemes
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Boneh, D., Hamburg, M.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 455-470
    • Boneh, D.1    Hamburg, M.2
  • 13
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 14
    • 44449176564 scopus 로고    scopus 로고
    • The Twin Diffie-Hellman Problem and Applications
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 15
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • Chaum, D.: Security without identification: Transaction systems to make Big Brother obsolete. Commun. ACM 1985 28(10), 1030-1044 (1985)
    • (1985) Commun. ACM 1985 , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 16
    • 85024290278 scopus 로고
    • Group Signatures
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 17
    • 38149117029 scopus 로고    scopus 로고
    • Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Delerablée, C.: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 18
    • 38149121099 scopus 로고    scopus 로고
    • Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
    • Delerablée, C., Paillier, P., Pointcheval, D.: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 39-59. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 19
    • 35248901924 scopus 로고    scopus 로고
    • Public Key Broadcast Encryption for Stateless Receivers
    • Feigenbaum, J. (ed.) DRM 2002. Springer, Heidelberg
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 20
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security of Multiple Encryption
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 21
    • 84861665813 scopus 로고    scopus 로고
    • Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225-242. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 225-242
    • Fazio, N.1    Perera, I.M.2
  • 22
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 23
    • 33746062799 scopus 로고    scopus 로고
    • Practical Identity-Based Encryption Without Random Oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 24
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 25
    • 34548150228 scopus 로고    scopus 로고
    • Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
    • Juels, A. (ed.) FC 2004. Springer, Heidelberg
    • Groth, J.: Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 90-104. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3110 , pp. 90-104
    • Groth, J.1
  • 27
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Tag-Based Encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 28
    • 84958971364 scopus 로고    scopus 로고
    • Multi-recipient Public-Key Encryption with Shortened Ciphertext
    • Naccache, D., Paillier, P. (eds.) PKC 2002. Springer, Heidelberg
    • Kurosawa, K.: Multi-recipient Public-Key Encryption with Shortened Ciphertext. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 48-63. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2274 , pp. 48-63
    • Kurosawa, K.1
  • 29
    • 35048835796 scopus 로고    scopus 로고
    • A New Paradigm of Hybrid Encryption Scheme
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Kurosawa, K., Desmedt, Y.: A New Paradigm of Hybrid Encryption Scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 30
    • 84894128126 scopus 로고    scopus 로고
    • Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
    • ePrint Archive: Report 2011/476
    • Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Cryptology ePrint Archive: Report 2011/476
    • Cryptology
    • Libert, B.1    Paterson, K.G.2    Quaglia, E.A.3
  • 31
    • 78650835413 scopus 로고    scopus 로고
    • A Closer Look at Anonymity and Robustness in Encryption Schemes
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Mohassel, P.: A Closer Look at Anonymity and Robustness in Encryption Schemes. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 501-518. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 501-518
    • Mohassel, P.1
  • 32
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001) (Pubitemid 33317907)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 33
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
    • Public Key Cryptography
    • Okamoto, T., Pointcheval, D.: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001) (Pubitemid 33232936)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 34
    • 52149113327 scopus 로고    scopus 로고
    • Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
    • Paterson, K.G., Srinivasan, S.: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 354-375. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5209 , pp. 354-375
    • Paterson, K.G.1    Srinivasan, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.