메뉴 건너뛰기




Volumn 8282 LNCS, Issue , 2014, Pages 121-135

A group action on ℤpx and the generalized DLP with auxiliary inputs

Author keywords

Cheon's algorithm; The discrete logarithm problem; The discrete logarithm problem with auxiliary inputs

Indexed keywords

CRYPTOGRAPHY;

EID: 84902603152     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-43414-7_6     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 1
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 2
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 3
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149-177 (2008)
    • (2008) J. Cryptol. , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297-319 (2004)
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 33746042561 scopus 로고    scopus 로고
    • Security analysis of the strong Diffie-Hellman problem
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Cheon, J.H.: Security analysis of the strong Diffie-Hellman problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1-11. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 1-11
    • Cheon, J.H.1
  • 11
    • 77954763128 scopus 로고    scopus 로고
    • Discrete logarithm problems with auxiliary inputs
    • Cheon, J.H.: Discrete logarithm problems with auxiliary inputs. J. Cryptol. 23(3), 457-476 (2010)
    • (2010) J. Cryptol. , vol.23 , Issue.3 , pp. 457-476
    • Cheon, J.H.1
  • 13
    • 77649118700 scopus 로고
    • Diffie-Hellman is as strong as discrete log for certain primes
    • Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
    • den Boer, B.: Diffie-Hellman is as strong as discrete log for certain primes. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 530-539. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 530-539
    • Den Boer, B.1
  • 14
    • 69949153112 scopus 로고    scopus 로고
    • Boneh-Boyen signatures and the strong Diffie-Hellman problem
    • Shacham, H., Waters, B. (eds.) Pairing 2009. Springer, Heidelberg
    • Jao, D., Yoshida, K.: Boneh-Boyen signatures and the strong Diffie-Hellman problem. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 1-16. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5671 , pp. 1-16
    • Jao, D.1    Yoshida, K.2
  • 16
    • 84902596352 scopus 로고    scopus 로고
    • A new approach to discrete logarithm problem with auxiliary inputs
    • Kim, T., Cheon, J.H.: A new approach to discrete logarithm problem with auxiliary inputs. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2012/ 609 (2012)
    • (2012) IACR Cryptology EPrint Archive
    • Kim, T.1    Cheon, J.H.2
  • 18
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Maurer, U.M.: Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 271-281. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 271-281
    • Maurer, U.M.1
  • 19
    • 0032621240 scopus 로고    scopus 로고
    • The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Maurer, U.M., Wolf, S.: The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms. SIAM J. Comput. 28(5), 1689-1721 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.5 , pp. 1689-1721
    • Maurer, U.M.1    Wolf, S.2
  • 21
    • 84902596353 scopus 로고    scopus 로고
    • On generalization of Cheon's algorithm
    • Satoh, T.: On generalization of Cheon's algorithm. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2009/058 (2009)
    • (2009) IACR Cryptology EPrint Archive
    • Satoh, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.