메뉴 건너뛰기




Volumn 6, Issue 6, 2013, Pages 790-796

Attribute-based ring signcryption scheme

Author keywords

Attribute based encryption; Cryptography; Provable security; Ring signcryption

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 84876794757     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.614     Document Type: Article
Times cited : (23)

References (22)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption)
    • LNCS 1294. Springer-Verlag: Berlin
    • Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption). In CRYPTO'1997LNCS 1294. Springer-Verlag: Berlin, 1997; 165-179.
    • (1997) CRYPTO'1997 , pp. 165-179
    • Zheng, Y.1
  • 2
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • LNCS 2248. Springer-Verlag: Berlin
    • Rivest L, Shamir A, Tauman Y. How to leak a secret In. In ASIACRYPTLNCS 2248. Springer-Verlag: Berlin, 2001; 552-565.
    • (2001) ASIACRYPT , pp. 552-565
    • Rivest, L.1    Shamir, A.2    Tauman, Y.3
  • 3
    • 84876815610 scopus 로고    scopus 로고
    • New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive: Report 2003/104.
    • Zhang F, Safavi R, Lin C. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive: Report 2003/104.
    • Zhang, F.1    Safavi, R.2    Lin, C.3
  • 4
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • LNCS 2442. Springer-Verlag: Berlin
    • Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In CRYPTO'02LNCS 2442. Springer-Verlag: Berlin, 2002; 465-480.
    • (2002) CRYPTO'02 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 5
    • 84876790864 scopus 로고    scopus 로고
    • ID-based ring signature and proxy ring signature schemes from bilinear pairings
    • Awasthi AK, Lal S. ID-based ring signature and proxy ring signature schemes from bilinear pairings. 2004, http://eprint.iacr.org/2004/184
    • (2004)
    • Awasthi, A.K.1    Lal, S.2
  • 6
    • 34247324841 scopus 로고    scopus 로고
    • Identity based anonymous designated ring signatures
    • Vancouver: British Columbia, Canada
    • Chen YQ, Susilo W, Mu Y. Identity based anonymous designated ring signatures. In IWCMC'06. Vancouver: British Columbia, Canada, 2006; 189-194.
    • (2006) IWCMC'06 , pp. 189-194
    • Chen, Y.Q.1    Susilo, W.2    Mu, Y.3
  • 7
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption scheme on elliptic curves
    • Elsevier: North-Holland
    • Zheng Y, Imai H. How to construct efficient signcryption scheme on elliptic curves. In Information Processing LettersElsevier: North-Holland, 1998; 277-233.
    • (1998) Information Processing Letters , pp. 277-233
    • Zheng, Y.1    Imai, H.2
  • 8
    • 84937414347 scopus 로고    scopus 로고
    • Identification, signature and signcrypiton using high order residues modulo an RSA composite
    • LNCS 1992. Springer-Verlag: Berlin
    • Zheng Y. Identification, signature and signcrypiton using high order residues modulo an RSA composite. In PKC01LNCS 1992. Springer-Verlag: Berlin, 2001; 48-63.
    • (2001) PKC01 , pp. 48-63
    • Zheng, Y.1
  • 9
    • 84947929166 scopus 로고    scopus 로고
    • Signcryption and its applications in efficient public key solutions
    • LNCS 1396. Springer-Verlag: Berlin
    • Zheng Y. Signcryption and its applications in efficient public key solutions. In Information SecurityLNCS 1396. Springer-Verlag: Berlin, 1998; 291-312.
    • (1998) Information Security , pp. 291-312
    • Zheng, Y.1
  • 10
  • 11
    • 80055097829 scopus 로고    scopus 로고
    • Identity-based multi-receiver threshold signcryption scheme. Security and Communication Networks
    • Qin H, Dai Y, Wang Z. Identity-based multi-receiver threshold signcryption scheme. Security and Communication Networks. 2010, http://onlinelibrary.wiley.com/doi/10.1002/sec.259/abstract
    • (2010)
    • Qin, H.1    Dai, Y.2    Wang, Z.3
  • 13
    • 84876816531 scopus 로고    scopus 로고
    • Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008/394
    • Li J, Kim K. Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008/394, 2008.
    • (2008)
    • Li, J.1    Kim, K.2
  • 14
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • LNCS3494. Springer-Verlag: Berlin
    • Sahai A, Waters B. Fuzzy identity-based encryption. In EUROCRYPTLNCS3494. Springer-Verlag: Berlin, 2005; 457-473.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 15
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data. CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA
    • Goyal V, Pandey A, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006; 89-98.
    • (2006) , pp. 89-98
    • Goyal, V.1    Pandey, A.2    Sahai, A.3    Waters, B.4
  • 16
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • LNCS 4965. Springer-Verlag: Berlin
    • Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPTLNCS 4965. Springer-Verlag: Berlin, 2008; 146-162.
    • (2008) EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 17
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with nonmonotonic access structures. CCS'07 Proceedings of the 14th ACM Conference on Computer and Communications Security. Whistler, Canada
    • Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with nonmonotonic access structures. CCS'07 Proceedings of the 14th ACM Conference on Computer and Communications Security. Whistler, Canada, 2007; 195-203.
    • (2007) , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 18
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. USA, DC, 321-334.
    • Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. USA, DC, 2007; 321-334.
    • (2007)
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 19
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • LNCS 5126. Springer-Verlag: Berlin
    • Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Automata, Languages and ProgrammingLNCS 5126. Springer-Verlag: Berlin, 2008; 579-591.
    • (2008) Automata,Languages and Programming , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 20
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • LNCS 5037. Springer-Verlag: Berlin
    • Nishide T, Yoneyama K, Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures. In ACNSLNCS 5037. Springer-Verlag: Berlin, 2008; 111-129.
    • (2008) ACNS , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 21
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • LNCS 4392. Springer-Verlag: Berlin
    • Chase M. Multi-authority attribute based encryption. In TCC 2007LNCS 4392. Springer-Verlag: Berlin, 2007; 515-534.
    • (2007) TCC 2007 , pp. 515-534
    • Chase, M.1
  • 22
    • 0346265013 scopus 로고    scopus 로고
    • Forking lemmas for ring signature scheme
    • LNCS 2094. Springer-Verlag: Berlin
    • Herranz J, Saez G. Forking lemmas for ring signature scheme. In Progress in CryptologyLNCS 2094. Springer-Verlag: Berlin, 2003; 266-279.
    • (2003) Progress in Cryptology , pp. 266-279
    • Herranz, J.1    Saez, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.