메뉴 건너뛰기




Volumn 115, Issue 2, 2015, Pages 351-358

An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem

Author keywords

Cryptography; Discrete logarithm problem; Identity based encryption; Integer factorization problem; Random oracle

Indexed keywords

ACCESS CONTROL; FACTORIZATION; SECURITY OF DATA;

EID: 84911471015     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2014.10.007     Document Type: Article
Times cited : (38)

References (20)
  • 1
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • CRYPTO 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
    • D. Boneh, and X. Boyen Secure identity based encryption without random oracles Advances in Cryptology CRYPTO 2004 Lecture Notes in Computer Science vol. 3152 2004 Springer-Verlag Berlin 443 459
    • (2004) Advances in Cryptology , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • EUROCRYPT 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
    • D. Boneh, and X. Boyen Efficient selective-id secure identity based encryption without random oracles Advances in Cryptology EUROCRYPT 2004 Lecture Notes in Computer Science vol. 3027 2004 Springer-Verlag Berlin 223 238
    • (2004) Advances in Cryptology , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 3
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO 2001 Lecture Notes in Computer Science Springer-Verlag Berlin
    • D. Boneh, and M.K. Franklin Identity-based encryption from the Weil pairing Advances in Cryptology CRYPTO 2001 Lecture Notes in Computer Science vol. 2193 2001 Springer-Verlag Berlin 213 229
    • (2001) Advances in Cryptology , vol.2193 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh, and M.K. Franklin Identity based encryption from the Weil pairing SIAM J. Comput. 32 3 2003 586 615
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 33745854208 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • D. Boneh, R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption SIAM J. Comput. 36 5 2003 1301 1328
    • (2003) SIAM J. Comput. , vol.36 , Issue.5 , pp. 1301-1328
    • Boneh, D.1    Canetti, R.2    Halevi, S.3    Katz, J.4
  • 6
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Lecture Notes in Computer Science Springer-Verlag
    • C. Cocks An identity based encryption scheme based on quadratic residues International Conference on Cryptography and Coding (Proceedings of IMA) Lecture Notes in Computer Science vol. 2260 2001 Springer-Verlag 360 363
    • (2001) International Conference on Cryptography and Coding (Proceedings of IMA) , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 7
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGmal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 31 1995 469 472
    • (1995) IEEE Trans. Inf. Theory , vol.31 , pp. 469-472
    • Elgmal, T.1
  • 8
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Crypto'99 Lecture Notes in Computer Science Springer-Verlag Berlin
    • E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes Advances in Cryptology Crypto'99 Lecture Notes in Computer Science vol. 1666 1999 Springer-Verlag Berlin 537 554
    • (1999) Advances in Cryptology , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 32244433334 scopus 로고    scopus 로고
    • K-Resilient identity-based encryption in the standard model
    • CT-RSA 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
    • S. Heng, and K. Kurosawa k-Resilient identity-based encryption in the standard model Topics in Cryptology CT-RSA 2004 Lecture Notes in Computer Science vol. 2964 2004 Springer-Verlag Berlin 67 80
    • (2004) Topics in Cryptology , vol.2964 , pp. 67-80
    • Heng, S.1    Kurosawa, K.2
  • 12
    • 32244433690 scopus 로고    scopus 로고
    • K-Resilient identity-based encryption in the standard model
    • S. Heng, and K. Kurosawa k-Resilient identity-based encryption in the standard model IEICE Trans. Fundam. E89CA 1 2006 39 46
    • (2006) IEICE Trans. Fundam. , vol.89 E CA , Issue.1 , pp. 39-46
    • Heng, S.1    Kurosawa, K.2
  • 13
    • 43149089620 scopus 로고    scopus 로고
    • CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption
    • Lecture Notes in Computer Science Springer-Verlag
    • E. Kiltz, and Y. Vahlis CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption CT-RSA Lecture Notes in Computer Science vol. 4964 2008 Springer-Verlag 221 239
    • (2008) CT-RSA , vol.4964 , pp. 221-239
    • Kiltz, E.1    Vahlis, Y.2
  • 14
    • 3042658813 scopus 로고    scopus 로고
    • Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
    • W.C. Lee, and K.C. Liao Constructing identity-based cryptosystems for discrete logarithm based cryptosystems J. Netw. Comput. Appl. 22 2004 191 199
    • (2004) J. Netw. Comput. Appl. , vol.22 , pp. 191-199
    • Lee, W.C.1    Liao, K.C.2
  • 15
    • 84911480739 scopus 로고    scopus 로고
    • ePrint Archive, Report 2002/072
    • B. Lynn Authenticated ID-based encryption, cryptology ePrint Archive, Report 2002/072 2002 http://eprint.iacr.org/2002/072
    • (2002) J. Netw. Comput. Appl.
    • Lynn, B.1
  • 16
    • 84863524235 scopus 로고    scopus 로고
    • An ID-based cryptographic mechanisms based on GDLP and IFP
    • C. Meshram, S. Meshram, and M. Zhang An ID-based cryptographic mechanisms based on GDLP and IFP Inf. Process. Lett. 112 19 2012 753 758
    • (2012) Inf. Process. Lett. , vol.112 , Issue.19 , pp. 753-758
    • Meshram, C.1    Meshram, S.2    Zhang, M.3
  • 17
    • 84875709980 scopus 로고    scopus 로고
    • An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
    • C. Meshram, and S. Meshram An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem Inf. Process. Lett. 113 10-11 2013 375 380
    • (2013) Inf. Process. Lett. , vol.113 , Issue.1011 , pp. 375-380
    • Meshram, C.1    Meshram, S.2
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Lecture Notes in Computer Science Springer-Verlag
    • A. Shamir Identity-based cryptosystems and signature schemes Proceedings of CRYPTO'84 Lecture Notes in Computer Science vol. 196 1984 Springer-Verlag 47 53
    • (1984) Proceedings of CRYPTO'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang An identity-based security system for user privacy in vehicular ad hoc networks IEEE Trans. Parallel Distrib. Syst. 27 9 2010 1227 1239
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.9 , pp. 1227-1239
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 20
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • CRYPTO 2005 Lecture Notes in Computer Science Springer-Verlag Berlin
    • B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology CRYPTO 2005 Lecture Notes in Computer Science vol. 3494 2005 Springer-Verlag Berlin 114 127
    • (2005) Advances in Cryptology , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.