메뉴 건너뛰기




Volumn 2, Issue 4, 2012, Pages 304-321

Public key encryption schemes supporting equality test with authorisation of different granularity

Author keywords

Authorisation granularity; Equality test; Public key encryption

Indexed keywords


EID: 84864207661     PISSN: 17530563     EISSN: 17530571     Source Type: Journal    
DOI: 10.1504/IJACT.2012.048079     Document Type: Article
Times cited : (136)

References (22)
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology - CRYPTO '98
    • Bellare, M., Desai, A., Pointcheval, D. and Rogaway, P. (1998) 'Relations among notions of security for public-key encryption schemes', in Krawczyk, H. (Ed.): Advances in Cryptology - CRYPTO 1998, LNCS, Vol. 1462, pp. 26-45, Springer. (Pubitemid 128118995)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 4
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • Blum, M. (1983) 'Coin flipping by telephone a protocol for solving impossible problems', SIGACT News, Vol. 15, No. 1, pp. 23-27.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1
  • 5
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Advances in Cryptology - CRYPTO '97
    • Boneh, D. and Franklin, M.K. (1997) 'Efficient generation of shared RSA keys (extended abstract)', in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pp. 425-439. (Pubitemid 127112570)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 7
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C. and Camenisch, J. (Eds.) LNCS, 3027 Springer
    • Boneh, D., Crescenzo, G.D., Ostrovsky, R. and Persiano, G. (2004b) 'Public key encryption with keyword search', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - EUROCRYPT 2004, LNCS, Vol. 3027, pp. 506-522, Springer.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 8
    • 52149104493 scopus 로고    scopus 로고
    • The uber-assumption family
    • Galbraith, S.D. and Paterson, K.G. (Eds.) LNCS, 5209 Springer
    • Boyen, X. (2008) 'The uber-assumption family', in Galbraith, S.D. and Paterson, K.G. (Eds.): Pairing-Based Cryptography - Pairing 2008, LNCS, Vol. 5209, pp. 39-56, Springer.
    • (2008) Pairing-based Cryptography - Pairing 2008 , pp. 39-56
    • Boyen, X.1
  • 10
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakley, G.R. and Chaum, D. (Eds.) LNCS, 196
    • ElGamal, T. (1984) 'A public key cryptosystem and a signature scheme based on discrete logarithms', in Blakley, G.R. and Chaum, D. (Eds.): Advances in Cryptology - CRYPTO 1984, LNCS, Vol. 196, pp. 10-18.
    • (1984) Advances in Cryptology - CRYPTO 1984 , pp. 10-18
    • ElGamal, T.1
  • 12
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Takagi, T., Okamoto, T., Okamoto, E. and Okamoto, T. (Eds.) LNCS, 4575 Springer
    • Hwang, Y.H. and Lee, P.J. (2007) 'Public key encryption with conjunctive keyword search and its extension to a multi-user system', in Takagi, T., Okamoto, T., Okamoto, E. and Okamoto, T. (Eds.): Pairing-Based Cryptography - Pairing 2007, LNCS, Vol. 4575, pp. 2-22, Springer.
    • (2007) Pairing-based Cryptography - Pairing 2007 , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (Ed.) LNCS, 1592
    • Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', in Stern, J. (Ed.): Advances in Cryptology -EUROCRYPT 1999, LNCS, Vol. 1592, pp. 223-238.
    • (1999) Advances in Cryptology -EUROCRYPT 1999 , pp. 223-238
    • Paillier, P.1
  • 15
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai, A. and Waters, B. (2005) 'Fuzzy identity-based encryption', in Advances in Cryptology - EUROCRYPT 2005, LNCS, Vol. 3494, pp. 457-473, Springer. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 17
    • 0036195374 scopus 로고    scopus 로고
    • Personal health records on the internet: A snapshot of the pioneers at the end of the 20th Century
    • DOI 10.1016/S1386-5056(01)00215-5, PII S1386505601002155
    • Sittig, D.F. (2002) 'Personal health records on the internet: a snapshot of the pioneers at the end of the 20th century', I.J. Medical Informatics, Vol. 65, No. 1, pp. 1-6. (Pubitemid 34213787)
    • (2002) International Journal of Medical Informatics , vol.65 , Issue.1 , pp. 1-6
    • Sittig, D.F.1
  • 18
    • 84864222204 scopus 로고    scopus 로고
    • Public key encryption supporting plaintext equality test and user-specified authorization
    • University of Twente
    • Tang, Q. (2011a) 'Public key encryption supporting plaintext equality test and user-specified authorization', Tech. Rep. TR-CTIT-11-20, CTIT, University of Twente, available at http://eprints.eemcs.utwente.nl/20529/.
    • (2011) Tech. Rep. TR-CTIT-11-20, CTIT
    • Tang, Q.1
  • 19
    • 79960259675 scopus 로고    scopus 로고
    • Towards public key encryption scheme supporting equality test with fine-grained authorization
    • LNCS, 6812 Springer
    • Tang, Q. (2011b) Towards public key encryption scheme supporting equality test with fine-grained authorization', in Proceedings of the 16th Australasian Conference on Information Security and Privacy, LNCS, Vol. 6812, pp. 389-406, Springer.
    • (2011) Proceedings of the 16th Australasian Conference on Information Security and Privacy , pp. 389-406
    • Tang, Q.1
  • 21
    • 79951652014 scopus 로고    scopus 로고
    • On non-parallelizable deterministic client puzzle scheme with batch verification modes
    • University of Twente
    • Tang, Q. and Jeckmans, A. (2010) 'On non-parallelizable deterministic client puzzle scheme with batch verification modes', Tech. Rep. TR-CTIT-10-02, CTIT, University of Twente, available at http://eprints.eemcs.utwente.nl/17107/.
    • (2010) Tech. Rep. TR-CTIT-10-02, CTIT
    • Tang, Q.1    Jeckmans, A.2
  • 22
    • 77952046408 scopus 로고    scopus 로고
    • Probabilistic public key encryption with equality test
    • Pieprzyk, J. (Ed.) LNCS, 5985 Springer
    • Yang, G., Tan, C., Huang, Q. and Wong, D.S. (2010) 'Probabilistic public key encryption with equality test', in Pieprzyk, J. (Ed.): Topics in Cryptology - CT-RSA 2010, LNCS, Vol. 5985, pp. 119-131, Springer.
    • (2010) Topics in Cryptology - CT-RSA 2010 , pp. 119-131
    • Yang, G.1    Tan, C.2    Huang, Q.3    Wong, D.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.