메뉴 건너뛰기




Volumn 8209 LNCS, Issue , 2013, Pages 309-329

Factoring-based proxy re-encryption schemes

Author keywords

chosen ciphertext attack; factoring; proxy re encryption

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CHOSEN-PLAINTEXT ATTACK; DIFFIE-HELLMAN ASSUMPTION; FACTORING; PROXY RE ENCRYPTIONS; PROXY RE-ENCRYPTION SCHEMES; RANDOM ORACLE MODEL; THE STANDARD MODEL;

EID: 84890956841     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-41227-1_18     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 1
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
    • (2005) NDSS
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 2
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 3
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo- random number generator
    • Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo- random number generator. SIAM Journal on Computing 15(2), 364-383 (1986)
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 8
    • 77953505052 scopus 로고    scopus 로고
    • Efficient unidirectional proxy re-encryption
    • Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
    • Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6055 , pp. 316-332
    • Chow, S.S.M.1    Weng, J.2    Yang, Y.3    Deng, R.H.4
  • 9
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption without pairings
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 10
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • Dunkelman, O. (ed.) CT-RSA 2012. Springer, Heidelberg
    • Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. stl LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7178 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 12
    • 80455132286 scopus 로고    scopus 로고
    • Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
    • Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. Springer, Heidelberg
    • Hayashi, R., Matsushita, T., Yoshida, T., Fujii, Y., Okada, K.: Unforgeability of re-encryption keys against collusion attack in proxy re-encryption. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol. 7038, pp. 210-229. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7038 , pp. 210-229
    • Hayashi, R.1    Matsushita, T.2    Yoshida, T.3    Fujii, Y.4    Okada, K.5
  • 13
    • 67650677267 scopus 로고    scopus 로고
    • Practical chosen ciphertext secure encryption from factoring
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 14
    • 84874289731 scopus 로고    scopus 로고
    • Proxy re-encryption in a stronger security model extended from CT-RSA2012
    • Dawson, E. (ed.) CT-RSA 2013. Springer, Heidelberg
    • Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277-292. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7779 , pp. 277-292
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 15
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 16
    • 77957655174 scopus 로고    scopus 로고
    • CCA proxy re-encryption without bilinear maps in the standard model
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Matsuda, T., Nishimaki, R., Tanaka, K.: CCA proxy re-encryption without bilinear maps in the standard model. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 261-278. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 261-278
    • Matsuda, T.1    Nishimaki, R.2    Tanaka, K.3
  • 17
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161-174 (1991)
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 18
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Shamir, A.: On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1(1) (1983)
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.1
    • Shamir, A.1
  • 19
    • 77957000385 scopus 로고    scopus 로고
    • Efficient chosen-ciphertext security via extractable hash proofs
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Wee, H.: Efficient chosen-ciphertext security via extractable hash proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 314-332
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.