메뉴 건너뛰기




Volumn , Issue , 2012, Pages 473-476

Comment on anonymous multi-receiver identity-based encryption scheme

Author keywords

Anonymity; attack; multi receiver ID based encryption; the improved method

Indexed keywords

ANONYMITY; ATTACK; COMPUTATIONAL COSTS; CRYPTOGRAPHIC PRIMITIVES; ID-BASED ENCRYPTION; IDENTITY BASED ENCRYPTION; IMPROVED SCHEME; LAGRANGE INTERPOLATING POLYNOMIALS; MULTI-RECEIVER; THE IMPROVED METHOD;

EID: 84870653535     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iNCoS.2012.117     Document Type: Conference Paper
Times cited : (16)

References (12)
  • 1
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • H.Wang,Y.Zhang, H.Xiong, B. Qin,Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme,IET Information. Security., 2012, Vol. 6, Iss. 1, pp. 20-27
    • (2012) IET Information. Security , vol.6 , Issue.1 , pp. 20-27
    • Wang, H.1    Zhang, Y.2    Xiong, H.3    Qin, B.4
  • 2
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Fan, D., Huang, L., Ho, P.: Anonymous multireceiver identity-based encryption, IEEE Trans. Comput., 2010, vol.59(9), pp.1239-1249
    • (2010) IEEE Trans. Comput. , vol.59 , Issue.9 , pp. 1239-1249
    • Fan, D.1    Huang, L.2    Ho, P.3
  • 3
    • 20444502239 scopus 로고    scopus 로고
    • An Id-based broadcast encryption scheme for key distribution
    • Du, X., Wang, Y., Ge, J. and Wang, Y. An Id-based broadcast encryption scheme for key distribution. IEEE Trans. Broadcast., vol.51, pp.264-266, 2005.
    • (2005) IEEE Trans. Broadcast. , vol.51 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 4
    • 36348947024 scopus 로고    scopus 로고
    • Comments on an efficient ID-based broadcast encryption scheme
    • Chien, H.Y. Comments on an efficient ID-based broadcast encryption scheme. IEEE Trans. Broadcast., vol.53, pp.809-810,2007.
    • (2007) IEEE Trans. Broadcast. , vol.53 , pp. 809-810
    • Chien, H.Y.1
  • 5
    • 73849111863 scopus 로고    scopus 로고
    • Certificateless Partially Blind Signature Scheme
    • Rong Weijian, Certificateless Partially Blind Signature Scheme, Journal of Zhangzhou Normal university, vol.4(2), pp 44-47, 2008.
    • (2008) Journal of Zhangzhou Normal University , vol.4 , Issue.2 , pp. 44-47
    • Weijian, R.1
  • 6
    • 24144432124 scopus 로고    scopus 로고
    • Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption
    • PKC 2005
    • Baek, J., Safavi-Naini, R. and Susilo, W. Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PKC 2005, LNCS 3386, pp. 380-397, 2005.
    • (2005) LNCS , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 8
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • M.Mambo, K.Usuda and E.Okamot. Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, NO.9, pp 1338-1353, 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamot, E.3
  • 9
    • 85020598353 scopus 로고
    • Identity Based on Cryptosystems and Signature Schemes
    • Crypto'84
    • Shamir,A., Identity Based on Cryptosystems and Signature Schemes. Crypto'84, LNCS 196, pp.47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput., vol.32, pp.586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 12
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Springer-Verlag
    • David Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, Springer-Verlag (1983),
    • (1983) Advances in Cryptology - Crypto '82
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.