메뉴 건너뛰기




Volumn 42, Issue 2, 2013, Pages 159-169

Efficient revocable multi-receiver ID-based encryption

Author keywords

Bilinear pairing; ID based encryption; Multi receiver; Random oracle model; Revocation

Indexed keywords


EID: 84878976411     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.42.2.2244     Document Type: Article
Times cited : (14)

References (30)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In: Proc. of CRYPTO'84, LNCS, 196, 1984, pp. 47-53.
    • (1984) Proc. of CRYPTO'84, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. In: Proc. of CRYPTO'01, LNCS, 2139, 2001, pp. 213-229.
    • (2001) Proc. of CRYPTO'01, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J. C. Cha, J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In: Proc. of PKC'03, LNCS, 2567, 2003, pp. 18-30.
    • (2003) Proc. of PKC'03, LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 4
    • 64249165649 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • M. Bellare, C. Namprempre, G. Neven. Security proofs for identity-based identification and signature schemes. Journal of Cryptology, 2009, Vol. 22, No. 1, pp. 1-61.
    • (2009) Journal of Cryptology , vol.22 , Issue.1 , pp. 1-61
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 5
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • B. Waters. Efficient identity-based encryption without random oracles. In: Proceedings of Eurocrypt'05, LNCS, 2005, Vol. 3494, pp. 114-127.
    • (2005) Proceedings of Eurocrypt'05, LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 7
    • 58349086247 scopus 로고    scopus 로고
    • Generalized identity based and broadcast encryption schemes
    • D. Boneh, M. Hamburg. Generalized identity based and broadcast encryption schemes. In: Proc. of Asiacrypt'08, LNCS, 5350, 2008, pp. 455-470.
    • (2008) Proc. of Asiacrypt'08, LNCS , vol.5350 , pp. 455-470
    • Boneh, D.1    Hamburg, M.2
  • 8
    • 84859161671 scopus 로고    scopus 로고
    • Towards generalized ID-based user authentication for mobile multi-server environment
    • Y. H. Chuang, Y. M. Tseng. Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems, 2012, Vol. 25, No. 4, pp. 447-460.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.4 , pp. 447-460
    • Chuang, Y.H.1    Tseng, Y.M.2
  • 9
    • 84872251767 scopus 로고    scopus 로고
    • A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches
    • Y. F. Chang, W. L. Tai, C. Y. Lin. A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches. Information Technology and Control, 2012, Vol.41, No. 1, pp. 60-68.
    • (2012) Information Technology and Control , vol.41 , Issue.1 , pp. 60-68
    • Chang, Y.F.1    Tai, W.L.2    Lin, C.Y.3
  • 10
    • 77955703761 scopus 로고    scopus 로고
    • An ID-based mutual authentication and key exchange protocol for low-power mobile devices
    • T. Y. Wu, Y. M. Tseng. An ID-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal, 2010, Vol. 53, No. 7, pp. 1062-1070.
    • (2010) The Computer Journal , vol.53 , Issue.7 , pp. 1062-1070
    • Wu, T.Y.1    Tseng, Y.M.2
  • 11
    • 84855277570 scopus 로고    scopus 로고
    • An efficient and secure identity-based strong designated verifier signature scheme
    • E. J. Yoon. An efficient and secure identity-based strong designated verifier signature scheme. Information Technology and Control, 2011, Vol.40, No. 4, pp. 323-329.
    • (2011) Information Technology and Control , vol.40 , Issue.4 , pp. 323-329
    • Yoon, E.J.1
  • 12
    • 84863643575 scopus 로고    scopus 로고
    • Towards ID-based authenticated group key exchange protocol with identifying malicious participants
    • T. Y. Wu, Y. M. Tseng. Towards ID-based authenticated group key exchange protocol with identifying malicious participants. Informatica, 2012, Vol. 23, No. 2, pp. 315-334.
    • (2012) Informatica , vol.23 , Issue.2 , pp. 315-334
    • Wu, T.Y.1    Tseng, Y.M.2
  • 13
    • 84863621901 scopus 로고    scopus 로고
    • A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
    • T. Y. Wu, Y. M. Tseng, T. T. Tsai. A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Computer Networks, 2012, 56 (12), 2994-3006.
    • (2012) Computer Networks , vol.56 , Issue.12 , pp. 2994-3006
    • Wu, T.Y.1    Tseng, Y.M.2    Tsai, T.T.3
  • 14
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • R. Housley, W. Polk, W. Ford, D. Solo. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. In: RFC 3280, IETF, 2002.
    • (2002) RFC 3280, IETF
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 17
    • 67650112905 scopus 로고    scopus 로고
    • Adaptive-ID secure revocable identity-based encryption
    • B. Libert, D. Vergnaud. Adaptive-ID secure revocable identity-based encryption. In: Proceedings ofCT-RSA'09, LNCS, 5473, 2009, pp. 1-15.
    • (2009) Proceedings OfCT-RSA'09, LNCS , vol.5473 , pp. 1-15
    • Libert, B.1    Vergnaud, D.2
  • 18
    • 84859342049 scopus 로고    scopus 로고
    • Efficient revocable ID-based encryption with a public channel
    • Y. M. Tseng, T. T. Tsai. Efficient revocable ID-based encryption with a public channel. The Computer Journal, 2012, Vol. 55, No. 4, pp. 475-486.
    • (2012) The Computer Journal , vol.55 , Issue.4 , pp. 475-486
    • Tseng, Y.M.1    Tsai, T.T.2
  • 19
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. of Computing, 2003, Vol. 32, No. 3, pp. 586-615.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 20
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • J. Baek, R. Safavi-Naini, W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Proceedings of'PKC'05, LNCS, 3386, 2005, pp. 380-397.
    • (2005) Proceedings Of'PKC'05, LNCS , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 21
    • 35048840186 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • J. Baek, Y. Zheng. Identity-based threshold decryption. In: Proceedings ofPKC'04, LNCS, 2947, 2004, pp. 262-276.
    • (2004) Proceedings OfPKC'04, LNCS , vol.2947 , pp. 262-276
    • Baek, J.1    Zheng, Y.2
  • 22
    • 33645585449 scopus 로고    scopus 로고
    • ID-based cryptosystems with pairing on elliptic curve
    • Report 2003/054
    • R. Sakai, M. Kasahara. ID-based cryptosystems with pairing on elliptic curve. In: Cryptology ePrint Archive, 2003, Report 2003/054.
    • (2003) Cryptology EPrint Archive
    • Sakai, R.1    Kasahara, M.2
  • 24
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • T. Okamoto, D. Pointcheval. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Proceedings ofCT-RSA'01, 2001, pp. 159-174.
    • (2001) Proceedings OfCT-RSA'01 , pp. 159-174
    • Okamoto, T.1    Pointcheval, D.2
  • 25
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare, P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of CCS'93, 1993, pp. 62-73.
    • (1993) Proceedings of CCS'93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 26
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, S. Halevi. The random oracle methodology, revisited. Journal of ACM, 2004, Vol. 51, No. 4, pp. 557-594.
    • (2004) Journal of ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 27
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • M. Scott. Computing the Tate pairing. In: Proceedings of CT-RSA'05, LNCS, 3376, 2005, pp. 293-304.
    • (2005) Proceedings of CT-RSA'05, LNCS , vol.3376 , pp. 293-304
    • Scott, M.1
  • 28
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • X. Cao, X. Zeng, W. Kou, L. Hu. Identity-based anonymous remote authentication for value-added services in mobile networks. In: IEEE Trans. Veh. TechnoL, 2009, Vol. 58, No. 7, pp. 3508-3517.
    • (2009) IEEE Trans. Veh. TechnoL , vol.58 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 29
    • 77955659710 scopus 로고    scopus 로고
    • An efficient user authentication and key exchange protocol for mobile client-server environment
    • T. Y. Wu, Y. M. Tseng. An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 2010, Vol. 54, No. 9, pp. 1520-1530.
    • (2010) Computer Networks , vol.54 , Issue.9 , pp. 1520-1530
    • Wu, T.Y.1    Tseng, Y.M.2
  • 30
    • 79955881087 scopus 로고    scopus 로고
    • Short-key certificateless encryption
    • G. Stephanides. Short-key certificateless encryption. In: Proceedings ofLightSec'11, 2011, pp. 69-75.
    • (2011) Proceedings OfLightSec'11 , pp. 69-75
    • Stephanides, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.