메뉴 건너뛰기




Volumn 7779 LNCS, Issue , 2013, Pages 277-292

Proxy re-encryption in a stronger security model extended from CT-RSA2012

Author keywords

chosen ciphertext attack; pairings; unidirectional proxy re encryption

Indexed keywords

BILINEAR GROUPS; CCA SECURITIES; CHOSEN CIPHERTEXT ATTACK; CIPHERTEXTS; COMPLEXITY ASSUMPTIONS; DIGITAL RIGHT MANAGEMENT; DISTRIBUTED FILE SYSTEMS; FULL CCA; PAIRINGS; PLAINTEXT; PROXY RE ENCRYPTIONS; RANDOM ORACLE; RE-ENCRYPTION; SECURITY DEFINITIONS; SECURITY MODEL; THE STANDARD MODEL;

EID: 84874289731     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36095-4_18     Document Type: Conference Paper
Times cited : (47)

References (22)
  • 1
    • 67650135696 scopus 로고    scopus 로고
    • Key-Private Proxy Re-encryption
    • Fischlin,M. (ed.) CT-RSA2009. Springer, Heidelberg
    • Ateniese, G., Benson, K., Hohenberger, S.: Key-Private Proxy Re-encryption. In: Fischlin,M. (ed.) CT-RSA2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5473 , pp. 279-294
    • Ateniese, G.1    Benson, K.2    Hohenberger, S.3
  • 2
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
    • (2005) NDSS
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACMCCS 1993, pp. 62-73. ACM Press (1993)
    • (1993) ACMCCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES in COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Boyen, X., Goh, E.J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from theWeil Pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-Based Encryption from theWeil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 35248897599 scopus 로고    scopus 로고
    • A Forward Secure Public Key Encryption Scheme
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: A Forward Secure Public Key Encryption Scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 254-271. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 254-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 11
    • 77953505052 scopus 로고    scopus 로고
    • Efficient Unidirectional Proxy Re-Encryption
    • Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
    • Chow, S.S.M.,Weng, J., Yang, Y.,Deng, R.H.: Efficient Unidirectional Proxy Re-Encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6055 , pp. 316-332
    • Chow, S.S.M.1    Weng, J.2    Yang, Y.3    Deng, R.H.4
  • 12
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Deng, R., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Deng, R.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 13
    • 85032883059 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 14
    • 84863280137 scopus 로고    scopus 로고
    • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    • Dunkelman, O. (ed.) CT-RSA 2012. Springer, Heidelberg
    • Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7178 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 15
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • The Internet Society
    • Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS. The Internet Society (2003)
    • (2003) NDSS
    • Ivan, A.1    Dodis, Y.2
  • 16
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Kiltz, E.: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 282-297. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 282-297
    • Kiltz, E.1
  • 17
    • 77952021770 scopus 로고    scopus 로고
    • Efficient CCA-Secure PKE from Identity-Based Techniques
    • Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
    • Lai, J., Deng, R.H., Liu, S., Kou, W.: Efficient CCA-Secure PKE from Identity-Based Techniques. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 132-147. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5985 , pp. 132-147
    • Lai, J.1    Deng, R.H.2    Liu, S.3    Kou, W.4
  • 18
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 19
    • 84874291827 scopus 로고    scopus 로고
    • A CCA-secure proxy re-encryption scheme with short ciphertexts
    • Nishimaki, R.: A CCA-secure proxy re-encryption scheme with short ciphertexts. In: SCIS 2011, 3F3-2 in Japanese (2011)
    • (2011) SCIS 2011, 3F3-2 in Japanese
    • Nishimaki, R.1
  • 20
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 21
    • 84857361860 scopus 로고    scopus 로고
    • Achieving key privacy without losing CCA security in proxy re-encryption
    • doi:10.1016/j.jss.2011.09.034
    • Shao, J., Liu, P., Zhou, Y.: Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Software (2011), doi:10.1016/j.jss. 2011.09.034
    • (2011) J. Syst. Software
    • Shao, J.1    Liu, P.2    Zhou, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.