메뉴 건너뛰기




Volumn 16, Issue 3, 2014, Pages 258-263

Hierarchical identity-based broadcast encryption scheme from LWE

Author keywords

Broadcast encryption; H IBBE; Lattices; LWE

Indexed keywords

BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; CHOSEN PLAINTEXTS; HIERARCHICAL IDENTITY-BASED BROADCAST ENCRYPTION; IDENTITY-BASED BROADCAST ENCRYPTIONS; INDISTINGUISHABILITY; LATTICE; LEARNING WITH ERRORS PROBLEMS; LWE; PROBLEM ASSUMPTIONS;

EID: 84904795474     PISSN: 12292370     EISSN: None     Source Type: Journal    
DOI: 10.1109/JCN.2014.000045     Document Type: Article
Times cited : (8)

References (20)
  • 1
    • 0001293053 scopus 로고
    • Broadcast encryption
    • A. Fiat and M. Naor, "Broadcast encryption," in Proc. CRYPTO, 1993, pp. 480-491.
    • (1993) Proc. CRYPTO , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 2
    • 33646870054 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, 2005, pp. 258-275.
    • (2005) Proc. CRYPTO , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 3
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts
    • C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts," in Proc. EUROCRYPT, 2009, pp. 171-188.
    • (2009) Proc. EUROCRYPT , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 4
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
    • (2007) Proc. ASIACRYPT , pp. 200-215
    • Delerablée, C.1
  • 6
    • 58349086247 scopus 로고    scopus 로고
    • Generalized identity based and broadcast encryption schemes
    • D. Boneh, M. Hamburg, "Generalized identity based and broadcast encryption schemes," in Proc. ASIACRYPT, 2008, pp. 455-470.
    • (2008) Proc. ASIACRYPT , pp. 455-470
    • Boneh, D.1    Hamburg, M.2
  • 7
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • New York, NY, USA
    • C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. STOC, New York, NY, USA, 2008, pp. 197-206.
    • (2008) Proc. STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 8
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H) IBE in the standard model
    • S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (H) IBE in the standard model," in Proc. EUROCRYPT, 2010, pp. 553-572.
    • (2010) Proc. EUROCRYPT , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 9
    • 77957015647 scopus 로고    scopus 로고
    • Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
    • S. Agrawal, D. Boneh, and X. Boyen, "Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE," in Proc. CRYPTO, 2010, pp. 98-115.
    • (2010) Proc. CRYPTO , pp. 98-115
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 10
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai trees, or how to delegate a lattice basis
    • D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert "Bonsai trees, or how to delegate a lattice basis," in Proc. EUROCRYPT, 2010, pp. 523-552.
    • (2010) Proc. EUROCRYPT , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 11
    • 79955534142 scopus 로고    scopus 로고
    • Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more
    • X. Boyen, "Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more," in Proc. PKC, 2010, pp. 499-517.
    • (2010) Proc. PKC , pp. 499-517
    • Boyen, X.1
  • 12
    • 84874743396 scopus 로고    scopus 로고
    • Lattice-based identity-based broadcast encryption scheme
    • J. Wang and J. Bi, (2010), Lattice-based identity-based broadcast encryption scheme, Cryptology ePrint Archive, Report 2010/288. [Online]. Available: http://eprint.iacr.org.
    • (2010) Cryptology EPrint Archive, Report 2010/288
    • Wang, J.1    Bi, J.2
  • 13
    • 84856523985 scopus 로고    scopus 로고
    • Hierarchical identity-based broadcast encryption scheme on lattices
    • J. Zhang and Q. Chen, "Hierarchical identity-based broadcast encryption scheme on lattices" in Proc. CIS, 2011, pp. 944-948.
    • (2011) Proc. CIS , pp. 944-948
    • Zhang, J.1    Chen, Q.2
  • 15
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on Gaussian measure
    • D. Micciancio and O. Regev, "Worst-case to average-case reductions based on Gaussian measure," SIAM J. Comput., pp. 267-302, 2007.
    • (2007) SIAM J. Comput , pp. 267-302
    • Micciancio, D.1    Regev, O.2
  • 16
    • 79751533106 scopus 로고    scopus 로고
    • Generating shorter bases for hard random lattices
    • J. Alwen and C. Peikert, "Generating shorter bases for hard random lattices," Theory Comput. Syst., pp. 535-553, 2011.
    • (2011) Theory Comput. Syst , pp. 535-553
    • Alwen, J.1    Peikert, C.2
  • 17
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • New York, USA
    • O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," in Proc. STOC, New York, USA, 2005, pp. 84-93.
    • (2005) Proc. STOC , pp. 84-93
    • Regev, O.1
  • 20
    • 38049125096 scopus 로고    scopus 로고
    • Reducing trust in the PKG in identity based cryptosystems
    • V. Goyal, "Reducing trust in the PKG in identity based cryptosystems," in Proc CRYPTO, 2007, pp. 430-447.
    • (2007) Proc CRYPTO , pp. 430-447
    • Goyal, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.