메뉴 건너뛰기




Volumn 13, Issue 3, 2011, Pages 161-166

A New Type of ID-based encryption system and its application to pay-TV systems

Author keywords

Broadcast encryption; ID based cryptosystem; Pay TV system

Indexed keywords

BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; ELGAMAL ENCRYPTION; ID-BASED CRYPTOSYSTEMS; ID-BASED ENCRYPTION; MODULAR EXPONENTIATION; NEW APPLICATIONS; PAY-TV SYSTEM; PRIVATE KEY; PUBLIC KEYS; RSA SYSTEMS; TAMPER RESISTANT;

EID: 84863012591     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (28)
  • 1
    • 0344196671 scopus 로고    scopus 로고
    • Sequen-tial key derivation patterns for broadcast encryption and key predistribution schemes
    • LNCS 2894 Springer-Verlag 2003
    • N. Attrapadung, K. Kobara, and H. Imai, "Sequen-tial key derivation patterns for broadcast encryption and key predistribution schemes", Asiacrypt 2003, LNCS 2894, pp. 374-391, Springer-Verlag, 2003.
    • (2003) Asiacrypt , pp. 374-391
    • Attrapadung, N.1    Kobara, K.2    Imai, H.3
  • 2
    • 34547348650 scopus 로고    scopus 로고
    • ID-based ring signature and proxy ring signature schemes from bilinear pairings
    • Mar
    • A. K Awasthi and S. Lal, "ID-based ring signature and proxy ring signature schemes from bilinear pairings", International Journal of Network Security, vol. 4, no. 2, pp. 187-192, Mar. 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 187-192
    • Awasthi, A.K.1    Lal, S.2
  • 3
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • 2005 LNCS 3386 Springer-Verlag Berlin
    • J. Baek, R. Safavi-Naini, and W. Susilo, "Efficient multi-receiver identity-based encryption and its application to broadcast encryption", PKC 2005, LNCS 3386, pp. 380-397, Springer-Verlag, Berlin, 2005.
    • (2005) PKC , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID identity based encryption without random oracles
    • LNCS, Springer-Verlag Berlin
    • D. Boneh, and X. Boyen, "Efficient selective-ID identity based encryption without random oracles", Eurocrypt 2004, LNCS 3027, pp. 223-238, Springer-Verlag, Berlin, 2004.
    • (2004) Eurocrypt 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • LNCS 3152 Springer-Verlag, Berlin
    • D. Boneh, and X. Boyen, "Secure identity based encryption without random oracles", Crypto 2004, LNCS 3152, pp. 443-459, Springer-Verlag, Berlin, 2004.
    • (2004) Crypto 2004 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • LNCS 2139 Springer-Verlag Berlin
    • D. Boneh, and M. Franklin, "Identity-based encryption from the Weil pairing", Crypto 2001, LNCS 2139, pp. 213-229, Springer-Verlag, Berlin, 2001.
    • (2001) Crypto 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • LNCS 3621 Springer-Verlag Berlin
    • D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys", Crypto 2005, LNCS 3621, pp. 258-275, Springer-Verlag, Berlin, 2005.
    • (2005) Crypto 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 8
    • 35248897599 scopus 로고    scopus 로고
    • A Forward-Secure Public-Key Encryption Scheme
    • LNCS 2656 Springer-Verlag Berlin
    • R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme", Eurocrypt 2003, LNCS 2656, pp. 255-271, Springer-Verlag, Berlin, 2003.
    • (2003) Eurocrypt 2003 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 9
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • LNCS 4833 Springer-Verlag Berlin
    • C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys", Asiacrypt 2007, LNCS 4833, pp. 200-215, Springer-Verlag, Berlin, 2007.
    • (2007) Asiacrypt 2007 , pp. 200-215
    • Delerablée, C.1
  • 10
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • LNCS 4575 Springer-Verlag Berlin
    • C. Delerablée, P. Paillier, and D. Pointcheval, "Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys", PAIRING 2007, LNCS 4575, pp. 39-59, Springer-Verlag, Berlin, 2007.
    • (2007) PAIRING 2007 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 11
    • 35248901924 scopus 로고    scopus 로고
    • Public key broadcast encryption for stateless receivers
    • LNCS Springer-Verlag, Berlin
    • Y. Dodis, and N. Fazio, "Public key broadcast encryption for stateless receivers", ACM DRM 2002, LNCS 2696, pp. 61-80, Springer-Verlag, Berlin, 2003.
    • (2003) ACM DRM 2002 , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 12
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithm", IEEE Transactions on Informtion Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Informtion Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 84979291225 scopus 로고
    • Broadcast encryption
    • LNCS 773 Springer-Verlag Berlin
    • A. Fiat, and M. Naor, "Broadcast encryption", Crypto 1993, LNCS 773, pp. 480-491, Springer-Verlag, Berlin, 1994.
    • (1994) Crypto 1993 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 14
    • 33746062799 scopus 로고    scopus 로고
    • Practical Identity-based encryption without random oracles
    • LNCS 4004 Springer-Verlag Berlin
    • C. Gentry, "Practical Identity-based encryption without random oracles", Eurocrypt 2006, LNCS 4004, pp. 445-464, Springer-Verlag, Berlin, 2006.
    • (2006) Eurocrypt 2006 , pp. 445-464
    • Gentry, C.1
  • 15
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • LNCS 3152 Springer-Verlag Berlin
    • M. T. Goodrich, J. Z. Sun, and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices", Crypto 2004, LNCS 3152, pp. 511-527, Springer-Verlag, Berlin, 2004.
    • (2004) Crypto 2004 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 16
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast en-cryption scheme
    • LNCS 2442 Springer-Verlag Berlin
    • D. Halevy, and A. Shamir, "The LSD broadcast en-cryption scheme", Crypto 2002, LNCS 2442, pp. 47-60, Springer-Verlag, Berlin, 2002.
    • (2002) Crypto 2002 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 17
    • 58449125766 scopus 로고    scopus 로고
    • Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption
    • LNCS 5339 Springer-Verlag Berlin
    • M. Kusakawa, H. Hiwatari, T. Asano, S. Matsuda, "Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption", CANS 2008, LNCS 5339, pp. 31-48, Springer-Verlag, Berlin, 2008.
    • (2008) CANS 2008 , pp. 31-48
    • Kusakawa, M.1    Hiwatari, H.2    Asano, T.3    Matsuda, S.4
  • 19
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • LNCS 2139 Springer-Verlag Berlin
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Crypto 2001, LNCS 2139, pp. 41-62, Springer-Verlag, Berlin, 2001.
    • (2001) Crypto 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 20
    • 50549101800 scopus 로고    scopus 로고
    • Public key broadcast encryption schemes with shorter transmissions
    • J.H. Park, H.J. Kim, M.H. Sung and D.H. Lee, "Public key broadcast encryption schemes with shorter transmissions", IEEE Transactions on Broadcasting, Vol. 54, No. 3, pp. 401-411, 2008.
    • (2008) IEEE Transactions on Broadcasting , vol.54 , Issue.3 , pp. 401-411
    • Park, J.H.1    Kim, H.J.2    Sung, M.H.3    Lee, D.H.4
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signa-ture schemes
    • LNCS 196 Springer-Verlag Berlin
    • A. Shamir, "Identity-based cryptosystems and signa-ture schemes", Crypto 1984, LNCS 196, pp. 47-53, Springer-Verlag, Berlin, 1985.
    • (1985) Crypto 1984 , pp. 47-53
    • Shamir, A.1
  • 25
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption with-out random oracles
    • LNCS 3494 Springer-Verlag Berlin.
    • B.Waters, "Efficient identity-based encryption with-out random oracles", Eurocrypt 2005, LNCS 3494, pp. 114-127, Springer-Verlag, Berlin, 2005.
    • (2005) Eurocrypt 2005 , pp. 114-127
    • Waters, B.1
  • 26
    • 80054088754 scopus 로고    scopus 로고
    • General group oriented ID-based cryptosystems with chosen plaintext security
    • Jan
    • C. Xu, J. Zhou, and G. Xiao, "General group oriented ID-based cryptosystems with chosen plaintext security", International Journal of Network Security, vol. 6, no. 1, pp. 1-5, Jan. 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.1 , pp. 1-5
    • Xu, C.1    Zhou, J.2    Xiao, G.3
  • 27
    • 80053609880 scopus 로고    scopus 로고
    • A traitor tracing scheme based on the RSA system
    • Sept
    • B. Yang, H. Ma, and S. Zhu, "A traitor tracing scheme based on the RSA system", International Journal of Network Security, vol. 5, no. 2, pp. 182-186, Sept. 2007.
    • (2007) International Journal of Network Security , vol.5 , Issue.2 , pp. 182-186
    • Yang, B.1    Ma, H.2    Zhu, S.3
  • 28
    • 80054058425 scopus 로고    scopus 로고
    • ID-based weak blind signature from bilinear pairings
    • Sept. 2007
    • Z. M. Zhao, "ID-based weak blind signature from bilinear pairings", International Journal of Network Security, vol. 7, no. 2, pp. 265-268, Sept. 2008.
    • (2008) International Journal of Network Security , vol.5 , Issue.2 , pp. 265-268
    • Zhao, Z.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.