메뉴 건너뛰기




Volumn 6, Issue 2, 2014, Pages 40-51

Efficient anonymous identity- based broadcast encryption without random oracles

Author keywords

Anonymous; Bilinear groups of prime order; Broadcast encryption; Identity based; Without random oracles

Indexed keywords

SECURITY OF DATA; SIGNAL RECEIVERS;

EID: 84919657590     PISSN: 19416210     EISSN: 19416229     Source Type: Journal    
DOI: 10.4018/ijdcf.2014040103     Document Type: Article
Times cited : (19)

References (29)
  • 1
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • Springer Berlin Heidelberg
    • Baek, J., Safavi-Naini, R., & Susilo, W. (2005). Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In Public Key Cryptography-PKC 2005 (pp. 380-397). Springer Berlin Heidelberg. doi:10.1007/978-3-540-30580-4-26
    • (2005) Public Key Cryptography-PKC 2005 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 2
    • 33750065702 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • Springer Berlin Heidelberg
    • Barth, A., Boneh, D., & Waters, B. (2006). Privacy in encrypted content distribution using private broadcast encryption. In Financial Cryptography and Data Security (pp. 52-64). Springer Berlin Heidelberg. doi:10.1007/11889663-4
    • (2006) Financial Cryptography and Data Security , pp. 52-64
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 3
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • January. Springer Berlin Heidelberg
    • Boneh, D., Gentry, C., & Waters, B. (2005, January). Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO 2005 (pp. 258-275). Springer Berlin Heidelberg. doi:10.1007/11535218-16
    • (2005) Advances in Cryptology-CRYPTO 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 4
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • Springer Berlin Heidelberg
    • Boyen, X., & Waters, B. (2006). Anonymous hierarchical identity-based encryption (without random oracles). In Advances in Cryptology- CRYPTO 2006 (pp. 290-307). Springer Berlin Heidelberg. doi:10.1007/11818175-17
    • (2006) Advances in Cryptology- CRYPTO 2006 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 5
    • 84859322276 scopus 로고    scopus 로고
    • Improved anonymous multi-receiver identity-based encryption
    • Chien, H. Y. (2012). Improved anonymous multi-receiver identity-based encryption. The Computer Journal, 55(4), 439-446. doi:10.1093/ comjnl/bxr086
    • (2012) The Computer Journal , vol.55 , Issue.4 , pp. 439-446
    • Chien, H.Y.1
  • 6
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Springer Berlin Heidelberg
    • Delerablée, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology-ASIACRYPT 2007 (pp. 200-215). Springer Berlin Heidelberg. doi:10.1007/978-3-540-76900-2-12
    • (2007) Advances in Cryptology-ASIACRYPT 2007 , pp. 200-215
    • Delerablée, C.1
  • 7
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • Springer Berlin Heidelberg
    • Delerablée, C., Paillier, P., & Pointcheval, D. (2007). Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-Based Cryptography-Pairing 2007 (pp. 39-59). Springer Berlin Heidelberg. doi:10.1007/978-3-540-73489-5-4
    • (2007) Pairing-Based Cryptography-Pairing 2007 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 8
    • 77952048540 scopus 로고    scopus 로고
    • Anonymity from asymmetry: New constructions for anonymous hibe
    • Springer Berlin Heidelberg
    • Ducas, L. (2010). Anonymity from asymmetry: New constructions for anonymous hibe. In Topics in Cryptology-CT-RSA 2010 (pp. 148-164). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-11925-5-11
    • (2010) Topics in Cryptology-CT-RSA 2010 , pp. 148-164
    • Ducas, L.1
  • 9
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Fan, C. I., Huang, L. Y., & Ho, P. H. (2010). Anonymous multireceiver identity-based encryption. Computers. IEEE Transactions on, 59(9), 1239-1249.
    • (2010) Computers, IEEE Transactions on , vol.59 , Issue.9 , pp. 1239-1249
    • Fan, C.I.1    Huang, L.Y.2    Ho, P.H.3
  • 10
    • 84861665813 scopus 로고    scopus 로고
    • Outsider-anonymous broadcast encryption with sublinear ciphertexts
    • Springer Berlin Heidelberg
    • Fazio, N., & Perera, I. M. (2012). Outsider-anonymous broadcast encryption with sublinear ciphertexts. In Public Key Cryptography-PKC 2012 (pp. 225-242). Springer Berlin Heidelberg. doi:10.1007/978-3-642-30057-8-14
    • (2012) Public Key Cryptography-PKC 2012 , pp. 225-242
    • Fazio, N.1    Perera, I.M.2
  • 11
    • 84979291225 scopus 로고
    • Broadcast encryption
    • January. Springer Berlin Heidelberg
    • Fiat, A., & Naor, M. (1994, January). Broadcast encryption. In Advances in Cryptology - CRYPTO'93 (pp. 480-491). Springer Berlin Heidelberg.
    • (1994) Advances in Cryptology - CRYPTO'93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 12
    • 77954639466 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to prime-order groups
    • Springer Berlin Heidelberg
    • Freeman, D. M. (2010). Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In Advances in Cryptology- EUROCRYPT 2010 (pp. 44-61). Springer Berlin Heidelberg. doi:10.1007/978-3-642-13190-5-3
    • (2010) Advances in Cryptology- EUROCRYPT 2010 , pp. 44-61
    • Freeman, D.M.1
  • 13
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • Springer Berlin Heidelberg
    • Gentry, C., & Waters, B. (2009). Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology-EUROCRYPT 2009 (pp. 171-188). Springer Berlin Heidelberg. doi:10.1007/978-3-642-01001-9-10
    • (2009) Advances in Cryptology-EUROCRYPT 2009 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 14
    • 84861593834 scopus 로고    scopus 로고
    • Privacy-preserving identity-based broadcast encryption
    • Hur, J., Park, C., & Hwang, S. O. (2012). Privacy-preserving identity-based broadcast encryption. Information Fusion, 13(4), 296-303. doi:10.1016/j.inffus.2011.03.003
    • (2012) Information Fusion , vol.13 , Issue.4 , pp. 296-303
    • Hur, J.1    Park, C.2    Hwang, S.O.3
  • 15
    • 38049060325 scopus 로고    scopus 로고
    • Unlinkable secret handshakes and key-private group key management schemes
    • January. Springer Berlin Heidelberg
    • Jarecki, S., & Liu, X. (2007, January). Unlinkable secret handshakes and key-private group key management schemes. In Applied Cryptography and Network Security (pp. 270-287). Springer Berlin Heidelberg. doi:10.1007/978-3-540-72738-5-18
    • (2007) Applied Cryptography and Network Security , pp. 270-287
    • Jarecki, S.1    Liu, X.2
  • 16
    • 84898467054 scopus 로고    scopus 로고
    • Key management scheme using dynamic identity-based broadcast encryption for social network services
    • Springer Berlin Heidelberg
    • Jung, Y., Nam, Y., Kim, J., Jeon, W., Lee, H., & Won, D. (2014). Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services. In Advanced in Computer Science and its Applications (pp. 435-443). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-41674-3-62
    • (2014) Advanced in Computer Science and Its Applications , pp. 435-443
    • Jung, Y.1    Nam, Y.2    Kim, J.3    Jeon, W.4    Lee, H.5    Won, D.6
  • 17
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Springer Berlin Heidelberg
    • Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology-EUROCRYPT 2008 (pp. 146-162). Springer Berlin Heidelberg. doi:10.1007/978-3- 540-78967-3-9
    • (2008) Advances in Cryptology-EUROCRYPT 2008 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 18
    • 85025119679 scopus 로고    scopus 로고
    • Efficient ciphertext-policy attribute based encryption with hidden policy
    • Springer Berlin Heidelberg
    • Li, X., Gu, D., Ren, Y., Ding, N., & Yuan, K. (2012). Efficient ciphertext-policy attribute based encryption with hidden policy. In Internet and Distributed Computing Systems (pp. 146-159). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-34883-9-12
    • (2012) Internet and Distributed Computing Systems , pp. 146-159
    • Li, X.1    Gu, D.2    Ren, Y.3    Ding, N.4    Yuan, K.5
  • 19
    • 84861702751 scopus 로고    scopus 로고
    • Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
    • Springer Berlin Heidelberg
    • Libert, B., Paterson, K. G., & Quaglia, E. A. (2012). Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In Public Key Cryptography-PKC 2012 (pp. 206-224). Springer Berlin Heidelberg. doi:10.1007/978-3-642-30057-8-13
    • (2012) Public Key Cryptography-PKC 2012 , pp. 206-224
    • Libert, B.1    Paterson, K.G.2    Quaglia, E.A.3
  • 20
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. Vehicular Technology. IEEE Transactions on, 56(6), 3442-3456.
    • (2007) Vehicular Technology, IEEE Transactions on , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.H.3    Shen, X.4
  • 21
    • 84858234376 scopus 로고    scopus 로고
    • Adaptively secure broadcast encryption with short ciphertexts
    • Malek, B., & Miri, A. (2012). Adaptively Secure Broadcast Encryption with Short Ciphertexts. International Journal of Network Security, 14(2), 71-79.
    • (2012) International Journal of Network Security , vol.14 , Issue.2 , pp. 71-79
    • Malek, B.1    Miri, A.2
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • January. Springer Berlin Heidelberg
    • Naor, D., Naor, M., & Lotspiech, J. (2001, January). Revocation and tracing schemes for stateless receivers. In Advances in Cryptology - CRYPTO 2001 (pp. 41-62). Springer Berlin Heidelberg. doi:10.1007/3-540-44647-8-3
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 23
    • 84903887855 scopus 로고    scopus 로고
    • Fully anonymous identity-based broadcast encryption without random oracles
    • Ren, Y., Niu, Z., & Zhang, X. (2014). Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. International Journal of Network Security, 16(3), 247-255.
    • (2014) International Journal of Network Security , vol.16 , Issue.3 , pp. 247-255
    • Ren, Y.1    Niu, Z.2    Zhang, X.3
  • 24
    • 84868328593 scopus 로고    scopus 로고
    • Non-interactive dynamic identity-based broadcast encryption without random oracles
    • Springer Berlin Heidelberg
    • Ren, Y., Wang, S., & Zhang, X. (2012). Non-interactive dynamic identity-based broadcast encryption without random oracles. In Information and Communications Security (pp. 479-487). Springer Berlin Heidelberg. doi:10.1007/978-3-642-34129-8-47
    • (2012) Information and Communications Security , pp. 479-487
    • Ren, Y.1    Wang, S.2    Zhang, X.3
  • 26
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer Berlin Heidelberg
    • Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2005 (pp. 114-127). Springer Berlin Heidelberg. doi:10.1007/11426639-7
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , pp. 114-127
    • Waters, B.1
  • 27
    • 84865498573 scopus 로고    scopus 로고
    • Secure identity-based encryption in the quantum random oracle model
    • Springer Berlin Heidelberg
    • Zhandry, M. (2012). Secure identity-based encryption in the quantum random oracle model. In Advances in Cryptology-CRYPTO 2012 (pp. 758-775). Springer Berlin Heidelberg. doi:10.1007/978-3-642-32009-5-44
    • (2012) Advances in Cryptology-CRYPTO 2012 , pp. 758-775
    • Zhandry, M.1
  • 28
    • 84894159504 scopus 로고    scopus 로고
    • Anonymous identity-based broadcast encryption with adaptive security
    • Springer International Publishing
    • Zhang, L., Wu, Q., & Mu, Y. (2013). Anonymous Identity-Based Broadcast Encryption with Adaptive Security. In Cyberspace Safety and Security (pp. 258-271). Springer International Publishing. doi:10.1007/978-3-319-03584-0-19
    • (2013) Cyberspace Safety and Security , pp. 258-271
    • Zhang, L.1    Wu, Q.2    Mu, Y.3
  • 29
    • 84865566085 scopus 로고    scopus 로고
    • Amendment to trace and revoke systems with short ciphertexts
    • Zhao, X. (2012). Amendment to Trace and Revoke Systems with Short Ciphertexts. International Journal of Network Security, 14(5), 251-256.
    • (2012) International Journal of Network Security , vol.14 , Issue.5 , pp. 251-256
    • Zhao, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.