메뉴 건너뛰기




Volumn 8209 LNCS, Issue , 2013, Pages 139-153

Towards anonymous ciphertext indistinguishability with identity leakage

Author keywords

anonymous ciphertext indistinguishability; identity based encryption; key escrow; leakage

Indexed keywords

CERTIFICATELESS ENCRYPTIONS; GENERIC CONSTRUCTION; IDENTITY BASED ENCRYPTION; INDISTINGUISHABILITY; KEY ESCROW; KEY GENERATION; PRIVACY LEAKAGES; SYSTEMATIC STUDY;

EID: 84890885869     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-41227-1_8     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
    • Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 4
    • 84865492443 scopus 로고    scopus 로고
    • Certificateless Encryption
    • IOS Press
    • Chow, S.S.M.: Certificateless Encryption. In: Identity-Based Cryptography, pp. 135-155. IOS Press (2008)
    • (2008) Identity-Based Cryptography , pp. 135-155
    • Chow, S.S.M.1
  • 5
    • 53449097686 scopus 로고    scopus 로고
    • A Survey of Certificateless Encryption Schemes and Security Models
    • Dent, A.W.: A Survey of Certificateless Encryption Schemes and Security Models. Int. J. Inf. Sec. 7(5), 349-377 (2008)
    • (2008) Int. J. Inf. Sec. , vol.7 , Issue.5 , pp. 349-377
    • Dent, A.W.1
  • 6
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 7
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 8
    • 67049154036 scopus 로고    scopus 로고
    • Removing escrow from identity-based encryption
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Chow, S.S.M.: Removing escrow from identity-based encryption. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 256-276. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 256-276
    • Chow, S.S.M.1
  • 9
    • 38049125096 scopus 로고    scopus 로고
    • Reducing trust in the PKG in identity based cryptosystems
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Goyal, V.: Reducing trust in the PKG in identity based cryptosystems. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 430-447. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 430-447
    • Goyal, V.1
  • 10
    • 45749146255 scopus 로고    scopus 로고
    • Traceable and retrievable identity-based encryption
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Au, M.H., Huang, Q., Liu, J.K., Susilo, W., Wong, D.S., Yang, G.: Traceable and retrievable identity-based encryption. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 94-110. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 94-110
    • Au, M.H.1    Huang, Q.2    Liu, J.K.3    Susilo, W.4    Wong, D.S.5    Yang, G.6
  • 11
    • 70349289356 scopus 로고    scopus 로고
    • Black-box accountable authority identity-based encryption
    • ACM
    • Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: CCS 2008, pp. 427-436. ACM (2008)
    • (2008) CCS 2008 , pp. 427-436
    • Goyal, V.1    Lu, S.2    Sahai, A.3    Waters, B.4
  • 12
    • 77955090387 scopus 로고    scopus 로고
    • How to construct identity-based signatures without the key escrow problem
    • Yuen, T.H., Susilo, W., Mu, Y.: How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Sec. 9(4), 297-311 (2010)
    • (2010) Int. J. Inf. Sec. , vol.9 , Issue.4 , pp. 297-311
    • Yuen, T.H.1    Susilo, W.2    Mu, Y.3
  • 13
    • 33745818483 scopus 로고    scopus 로고
    • Security-Mediated Certificateless Cryptography
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
    • Chow, S.S.M., Boyd, C., González Nieto, J.M.: Security-Mediated Certificateless Cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508-524. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3958 , pp. 508-524
    • Chow, S.S.M.1    Boyd, C.2    González Nieto, J.M.3
  • 14
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 70-88. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 70-88
    • Lewko, A.1    Rouselakis, Y.2    Waters, B.3
  • 15
    • 84859970436 scopus 로고    scopus 로고
    • Identity-based encryption resilient to continual auxiliary leakage
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 117-134. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 117-134
    • Yuen, T.H.1    Chow, S.S.M.2    Zhang, Y.3    Yiu, S.M.4
  • 16
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • (extended abstract). Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 17
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 18
    • 84871593637 scopus 로고    scopus 로고
    • RKA security beyond the linear barrier: IBE, encryption and signatures
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
    • Bellare, M., Paterson, K.G., Thomson, S.: RKA security beyond the linear barrier: IBE, encryption and signatures. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 331-348. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7658 , pp. 331-348
    • Bellare, M.1    Paterson, K.G.2    Thomson, S.3
  • 20
    • 84863311631 scopus 로고    scopus 로고
    • Storing Secrets on Continually Leaky Devices
    • Ostrovsky, R. (ed.) IEEE
    • Dodis, Y., Lewko, A.B., Waters, B., Wichs, D.: Storing Secrets on Continually Leaky Devices. In: Ostrovsky, R. (ed.) FOCS 2011, pp. 688-697. IEEE (2011)
    • (2011) FOCS 2011 , pp. 688-697
    • Dodis, Y.1    Lewko, A.B.2    Waters, B.3    Wichs, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.