메뉴 건너뛰기




Volumn 19 LNICST, Issue , 2009, Pages 311-329

Defending against key abuse attacks in KP-ABE enabled broadcast systems

Author keywords

[No Author keywords available]

Indexed keywords

BLACK BOX TRACING; BROADCAST SYSTEMS; CIPHERTEXTS; CRYPTOGRAPHIC PRIMITIVES; DIFFIE HELLMAN; PROVABLY SECURE; SECRET KEY; SENSITIVE DATAS; TRACING ALGORITHM; USER ID;

EID: 84885886363     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05284-2_18     Document Type: Conference Paper
Times cited : (65)

References (18)
  • 2
    • 84985922619 scopus 로고
    • Tracing traitors
    • Desmedt, Y.G. (ed.) LNCS Springer, Heidelberg
    • Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1994 , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 3
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Wiener, M. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: An efficient public key traitor tracing scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999 , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.K.2
  • 4
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • Knud-sen, L.R. (ed.) LNCS Springer, Heidelberg
    • Kiayias, A., Yung, M.: Traitor tracing with constant transmission rate. In: Knud-sen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002 , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 6
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) LNCS Springer, Heidelberg
    • Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111-129. Springer, Heidelberg (2008)
    • (2008) ACNS 2008 , vol.5037 , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 7
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 8
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: SP 2007, Washington, DC, USA, pp. 321-334. IEEE Computer Society, Los Alamitos (2007) (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 9
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy abe
    • ACM, New York
    • Cheung, L., Newport, C.: Provably secure ciphertext policy abe. In: CCS 2007, pp. 456-465. ACM, New York (2007)
    • (2007) CCS 2007 , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 10
    • 34548769073 scopus 로고    scopus 로고
    • Attribute-based publishing with hidden credentials and hidden policies
    • LNCS Springer, Heidelberg
    • Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS 2007. LNCS, vol. 5037, pp. 179-192. Springer, Heidelberg (2007)
    • (2007) NDSS 2007 , vol.5037 , pp. 179-192
    • Kapadia, A.1    Tsang, P.2    Smith, S.3
  • 11
    • 70349086608 scopus 로고    scopus 로고
    • Attribute-based on-demand multicast group setup with membership anonymity
    • Yu, S., Ren, K., Lou, W.: Attribute-based on-demand multicast group setup with membership anonymity. In: Securecomm (2008)
    • (2008) Securecomm
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 12
    • 58049192731 scopus 로고    scopus 로고
    • Attribute-based content distribution with hidden policy
    • Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: NPSEC (2008)
    • (2008) NPSEC
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 14
    • 79956000593 scopus 로고    scopus 로고
    • A2be: Accountable attribute-based encryption for abuse free access control
    • Li, J., Ren, K., Kim, K.: A2be: Accountable attribute-based encryption for abuse free access control. Cryptology ePrint Archive, Report 2009/118 (2009), http://eprint.iacr.org/
    • (2009) Cryptology EPrint Archive, Report 2009/118
    • Li, J.1    Ren, K.2    Kim, K.3
  • 15
    • 79959578061 scopus 로고    scopus 로고
    • Privacy-aware attribute-based encryption with user accountability
    • Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: ISC (2009)
    • (2009) ISC
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 16
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 17
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 18
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In: IEEE INFOCOM (2009)
    • (2009) IEEE INFOCOM
    • Yu, S.1    Ren, K.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.