메뉴 건너뛰기




Volumn 8270 LNCS, Issue PART 2, 2013, Pages 280-300

Constrained pseudorandom functions and their applications

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST ENCRYPTION SYSTEMS; CIPHERTEXTS; FORMAL FRAMEWORK; IDENTITY-BASED; KEY EXCHANGE; MASTER KEY; PSEUDO-RANDOM FUNCTIONS; SET SYSTEM;

EID: 84892392741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-42045-0_15     Document Type: Conference Paper
Times cited : (254)

References (32)
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586-615 (2001)
    • (2001) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 6
    • 0012970453 scopus 로고    scopus 로고
    • Extended abstract in (ed.) CRYPTO 2001. Springer, Heidelberg
    • Extended abstract in Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Kilian, J.1
  • 7
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 8
    • 5644266059 scopus 로고    scopus 로고
    • Applications of multilinear forms to cryptography
    • Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemporary Mathematics 324, 71-90 (2003)
    • (2003) Contemporary Mathematics , vol.324 , pp. 71-90
    • Boneh, D.1    Silverberg, A.2
  • 9
    • 84892423246 scopus 로고    scopus 로고
    • Constrained pseudorandom functions and their applications
    • Report 2013/352
    • Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. Cryptology ePrint Archive, Report 2013/352 (2013)
    • (2013) Cryptology ePrint Archive
    • Boneh, D.1    Waters, B.2
  • 11
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255-271. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 13
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 14
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
    • Delerablée, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 39-59. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 15
    • 29244438183 scopus 로고    scopus 로고
    • Provably secure non-interactive key distribution based on pairings
    • Dupont, R., Enge, A.: Provably secure non-interactive key distribution based on pairings. Discrete Applied Mathematics 154(2), 270-276 (2006)
    • (2006) Discrete Applied Mathematics , vol.154 , Issue.2 , pp. 270-276
    • Dupont, R.1    Enge, A.2
  • 16
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 17
    • 84884490208 scopus 로고    scopus 로고
    • Programmable hash functions in the multilinear setting
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Freire, E.S.V., Hofheinz, D., Paterson, K.G., Striecks, C.: Programmable hash functions in the multilinear setting. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 513-530. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 513-530
    • Freire, E.S.V.1    Hofheinz, D.2    Paterson, K.G.3    Striecks, C.4
  • 18
    • 84879875394 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 1-17
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 19
    • 84884481521 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits from multilinear maps
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479-499. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 479-499
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Sahai, A.4    Waters, B.5
  • 20
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 21
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 34(4), 792-807 (1986)
    • (1986) J. ACM , vol.34 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 22
    • 78649813511 scopus 로고    scopus 로고
    • Attribute-based authenticated key exchange
    • Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. Springer, Heidelberg
    • Choudary Gorantla, M., Boyd, C., Nieto, J.M.G.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 300-317. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6168 , pp. 300-317
    • Choudary Gorantla, M.1    Boyd, C.2    Nieto, J.M.G.3
  • 24
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 26
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 27
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS 1997, pp. 458-467 (1997)
    • (1997) FOCS 1997 , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 28
    • 63349083067 scopus 로고    scopus 로고
    • On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
    • Paterson, K., Srinivasan, S.: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des. Codes Cryptography 52(2), 219-241 (2009)
    • (2009) Des. Codes Cryptography , vol.52 , Issue.2 , pp. 219-241
    • Paterson, K.1    Srinivasan, S.2
  • 29
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proc. of STOC 2005, pp. 84-93 (2005)
    • (2005) Proc. of STOC 2005 , pp. 84-93
    • Regev, O.1
  • 30
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.