메뉴 건너뛰기




Volumn 8043 LNCS, Issue PART 2, 2013, Pages 129-147

An algebraic framework for Diffie-Hellman assumptions

Author keywords

Diffie Hellman Assumption; Groth Sahai proofs; hash proof systems; public key encryption

Indexed keywords

DECISIONAL ASSUMPTIONS; DIFFIE-HELLMAN ASSUMPTION; EFFICIENCY IMPROVEMENT; GROTH-SAHAI PROOFS; HASH PROOF SYSTEMS; INDEPENDENT CONTRIBUTIONS; PSEUDO-RANDOM FUNCTIONS; PUBLIC-KEY ENCRYPTION;

EID: 84884471367     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40084-1_8     Document Type: Conference Paper
Times cited : (184)

References (30)
  • 1
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg 131, 137
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) 131, 137
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 2
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg 130, 138
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004) 130, 138
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg 130
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) 130
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 78650021967 scopus 로고    scopus 로고
    • Algebraic pseudorandom functions with improved efficiency from the augmented cascade
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Press October 130, 133
    • Boneh, D., Montgomery, H.W., Raghunathan, A.: Algebraic pseudorandom functions with improved efficiency from the augmented cascade. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 131-140. ACM Press (October 2010) 130, 133
    • (2010) ACM CCS 2010 , pp. 131-140
    • Boneh, D.1    Montgomery, H.W.2    Raghunathan, A.3
  • 5
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg 132, 138
    • Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006) 132, 138
    • (2006) LNCS , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 6
    • 52149104493 scopus 로고    scopus 로고
    • The uber-assumption family: A unified complexity framework for bilinear groups
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg 131, 137
    • Boyen, X.: The uber-assumption family: A unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008) 131, 137
    • (2008) LNCS , vol.5209 , pp. 39-56
    • Boyen, X.1
  • 7
    • 67650691588 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg 134, 145
    • Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009) 134, 145
    • (2009) LNCS , vol.5479 , pp. 351-368
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg 130
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) 130
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg 130, 133
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002) 130, 133
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 10
    • 78751485079 scopus 로고    scopus 로고
    • Cryptography against continuous memory attacks
    • IEEE Computer Society Press October 134, 145
    • Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: 51st FOCS, pp. 511-520. IEEE Computer Society Press (October 2010) 134, 145
    • (2010) 51st FOCS , pp. 511-520
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 11
    • 78650817944 scopus 로고    scopus 로고
    • Efficient public-key cryptography in the presence of key leakage
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg 134
    • Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient public-key cryptography in the presence of key leakage. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 613-631. Springer, Heidelberg (2010) 134
    • (2010) LNCS , vol.6477 , pp. 613-631
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 12
    • 84884471864 scopus 로고    scopus 로고
    • An algebraic framework for diffie-hellman assumptions
    • 132, 136, 137, 139, 141, 142, 143, 144
    • Escala, A., Herold, G., Kiltz, E., Ràfols, C., Villar, J.: An algebraic framework for diffie-hellman assumptions. Cryptology ePrint Archive (2013), http://eprint.iacr.org/ 132, 136, 137, 139, 141, 142, 143, 144
    • (2013) Cryptology ePrint Archive
    • Escala, A.1    Herold, G.2    Kiltz, E.3    Ràfols, C.4    Villar, J.5
  • 13
    • 82955177078 scopus 로고    scopus 로고
    • Non-interactive and re-usable universally composable string commitments with adaptive security
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg 134
    • Fischlin, M., Libert, B., Manulis, M.: Non-interactive and re-usable universally composable string commitments with adaptive security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 468-485. Springer, Heidelberg (2011) 134
    • (2011) LNCS , vol.7073 , pp. 468-485
    • Fischlin, M.1    Libert, B.2    Manulis, M.3
  • 14
    • 77954639466 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to prime-order groups
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg 130, 132
    • Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010) 130, 132
    • (2010) LNCS , vol.6110 , pp. 44-61
    • Freeman, D.M.1
  • 15
    • 84865578167 scopus 로고    scopus 로고
    • Identity-based encryption with master key-dependent message security and leakage-resilience
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg 132
    • Galindo, D., Herranz, J., Villar, J.: Identity-based encryption with master key-dependent message security and leakage-resilience. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 627-642. Springer, Heidelberg (2012) 132
    • (2012) LNCS , vol.7459 , pp. 627-642
    • Galindo, D.1    Herranz, J.2    Villar, J.3
  • 16
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg 130
    • Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz 130
    • (2003) LNCS , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 17
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg 130, 133, 141, 142
    • Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) 130, 133, 141, 142
    • (2008) LNCS , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 18
    • 84865459781 scopus 로고    scopus 로고
    • Tightly secure signatures and public-key encryption
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg 134, 145
    • Hofheinz, D., Jager, T.: Tightly secure signatures and public-key encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 590-607. Springer, Heidelberg (2012) 134, 145
    • (2012) LNCS , vol.7417 , pp. 590-607
    • Hofheinz, D.1    Jager, T.2
  • 19
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg 130, 138
    • Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007) 130, 138
    • (2007) LNCS , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 20
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • 130
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4), 263-276 (2004) 130
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 21
    • 79953207657 scopus 로고    scopus 로고
    • Round-optimal password-based authenticated key exchange
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg 134, 145
    • Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011) 134, 145
    • (2011) LNCS , vol.6597 , pp. 293-310
    • Katz, J.1    Vaikuntanathan, V.2
  • 22
    • 84974681711 scopus 로고    scopus 로고
    • A tool box of cryptographic functions related to the Diffie-Hellman function
    • Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. Springer, Heidelberg 132
    • Kiltz, E.: A tool box of cryptographic functions related to the Diffie-Hellman function. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 339-350. Springer, Heidelberg (2001) 132
    • (2001) LNCS , vol.2247 , pp. 339-350
    • Kiltz, E.1
  • 23
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-ciphertext security from tag-based encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg 130
    • Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006) 130
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 24
    • 84859952520 scopus 로고    scopus 로고
    • Tools for simulating features of composite order bilinear groups in the prime order setting
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg 131
    • Lewko, A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 318-335. Springer, Heidelberg (2012) 131
    • (2012) LNCS , vol.7237 , pp. 318-335
    • Lewko, A.B.1
  • 25
    • 84858324813 scopus 로고    scopus 로고
    • Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg 134, 143
    • Libert, B., Yung, M.: Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 75-93. Springer, Heidelberg (2012) 134, 143
    • (2012) LNCS , vol.7194 , pp. 75-93
    • Libert, B.1    Yung, M.2
  • 26
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • IEEE Computer Society Press October 130, 133
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, pp. 458-467. IEEE Computer Society Press (October 1997) 130, 133
    • (1997) 38th FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 27
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press May 134
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC. ACM Press (May 1990) 134
    • (1990) 22nd ACM STOC
    • Naor, M.1    Yung, M.2
  • 28
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg 131
    • Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010) 131
    • (2010) LNCS , vol.6223 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 29
    • 38049124394 scopus 로고    scopus 로고
    • A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • Report 2007/074 130, 138
    • Shacham, H.: A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/ 130, 138
    • (2007) Cryptology ePrint Archive
    • Shacham, H.1
  • 30
    • 84871565592 scopus 로고    scopus 로고
    • Optimal reductions of some decisional problems to the rank problem
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg 132
    • Villar, J.L.: Optimal reductions of some decisional problems to the rank problem. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 80-97. Springer, Heidelberg (2012) 132
    • (2012) LNCS , vol.7658 , pp. 80-97
    • Villar, J.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.