메뉴 건너뛰기




Volumn , Issue , 2013, Pages 669-683

Delegatable pseudorandom functions and applications

Author keywords

authentication; broadcast encryption; delegation of computation; pseudorandom functions; rfids; searchable encryption

Indexed keywords

BANDWIDTH EFFICIENCY; BROADCAST ENCRYPTION; CRYPTOGRAPHIC PRIMITIVES; DESIGN CHALLENGES; PSEUDO-RANDOM FUNCTIONS; RFIDS; SEARCHABLE ENCRYPTIONS; SECURITY APPLICATION;

EID: 84889072826     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516668     Document Type: Conference Paper
Times cited : (242)

References (34)
  • 2
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 6
    • 84855426977 scopus 로고    scopus 로고
    • Secure proxy signature schemes for delegation of signing rights
    • A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signature schemes for delegation of signing rights. Journal of Cryptology, 25:57-115, 2012.
    • (2012) Journal of Cryptology , vol.25 , pp. 57-115
    • Boldyreva, A.1    Palacio, A.2    Warinschi, B.3
  • 8
    • 84880890468 scopus 로고    scopus 로고
    • To appear; full version in
    • To appear; full version in Cryptology ePrint Archive, 2013:352.
    • Cryptology ePrint Archive , vol.2013 , pp. 352
  • 16
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • ACM
    • D. Fiore and R. Gennaro. Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proc. of the 19th Conf. on Computer and Comm. Security (CCS), pages 501-512. ACM, 2012.
    • (2012) Proc. of the 19th Conf. on Computer and Comm. Security (CCS) , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 18
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 22
    • 77952405138 scopus 로고    scopus 로고
    • Forward Security: Adaptive Cryptography - Time Evolution
    • chapter John Wiley and Sons
    • G. Itkis. Handbook of Information Security, chapter Forward Security: Adaptive Cryptography - Time Evolution. John Wiley and Sons, 2006.
    • (2006) Handbook of Information Security
    • Itkis, G.1
  • 24
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • Springer-Verlag
    • S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of the 6th Theory of Cryptography Conference (TCC), pages 577-594. Springer-Verlag, 2009.
    • (2009) Proc. of the 6th Theory of Cryptography Conference (TCC) , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 33
    • 78649491243 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • M. Naor and B. Pinkas. Efficient trace and revoke schemes. Int. J. Inf. Sec., 9(6):411-424, 2010.
    • (2010) Int. J. Inf. Sec. , vol.9 , Issue.6 , pp. 411-424
    • Naor, M.1    Pinkas, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.