메뉴 건너뛰기




Volumn 28, Issue 4, 2015, Pages 645-658

An improved anonymous multi-receiver identity-based encryption scheme

Author keywords

Anonymity; Anonymous multi receiver encryption; Attack; Security analysis

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTER NETWORKS;

EID: 84922263039     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2693     Document Type: Article
Times cited : (23)

References (18)
  • 1
    • 20444502239 scopus 로고    scopus 로고
    • An ID-based broadcast encryption scheme for key distribution
    • Du X, Wang Y, Ge J, Wang Y. An ID-based broadcast encryption scheme for key distribution. IEEE Transactions on Broadcasting 2005; 51(2):264-266.
    • (2005) IEEE Transactions on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 2
    • 36348947024 scopus 로고    scopus 로고
    • Comments on an efficient ID-based broadcast encryption scheme
    • Chien HY. Comments on an efficient ID-based broadcast encryption scheme. IEEE Transaction on Broadcasting 2007; 53:809-810.
    • (2007) IEEE Transaction on Broadcasting , vol.53 , pp. 809-810
    • Chien, H.Y.1
  • 3
    • 84859322276 scopus 로고    scopus 로고
    • Improved anonymous multi-receiver identity-based encryption
    • Chien HY. Improved anonymous multi-receiver identity-based encryption. The Computer Journal 2012; 55(4):439-446.
    • (2012) The Computer Journal , vol.55 , Issue.4 , pp. 439-446
    • Chien, H.Y.1
  • 4
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • Wang H, Zhang Y, Xiong H, Qin B. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security 2012; 6(1):20-27.
    • (2012) IET Information Security , vol.6 , Issue.1 , pp. 20-27
    • Wang, H.1    Zhang, Y.2    Xiong, H.3    Qin, B.4
  • 7
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proceedings of CRYPTO, Berlin Heldelberg
    • Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of CRYPTO, Vol. 196, LNCS, Berlin Heldelberg, 1985; 47-53.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proceedings of Crypto'01, London, UK
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Proceedings of Crypto'01, Vol. 2139, LNCS, London, UK, 2001; 213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 29144440106 scopus 로고    scopus 로고
    • Efficient identity-based multicast scheme from bilinear pairing
    • Wang L,Wu C. Efficient identity-based multicast scheme from bilinear pairing. IEEE Proceeding on Communication 2005; 152(6):877-882.
    • (2005) IEEE Proceeding on Communication , vol.152 , Issue.6 , pp. 877-882
    • Wang, L.1    Wu, C.2
  • 10
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Fan CI, Huang LY, Ho PH. Anonymous multireceiver identity-based encryption. IEEE Transactions on Computers 2010; 59(9):1239-1249.
    • (2010) IEEE Transactions on Computers , vol.59 , Issue.9 , pp. 1239-1249
    • Fan, C.I.1    Huang, L.Y.2    Ho, P.H.3
  • 11
    • 84880573517 scopus 로고    scopus 로고
    • Efficient constructions of anonymous multireceiver encryption protocol and their deploymen in group e-mail system with privacy preservation
    • Zhang MW, Takagi T. Efficient constructions of anonymous multireceiver encryption protocol and their deploymen in group e-mail system with privacy preservation. IEEE Systems Journal 2013; 7(3):410-419.
    • (2013) IEEE Systems Journal , vol.7 , Issue.3 , pp. 410-419
    • Zhang, M.W.1    Takagi, T.2
  • 13
    • 84897399924 scopus 로고    scopus 로고
    • Insecurity of improved Anonymous multi-receiver identity-based encryption
    • First published online: May 30, 2013
    • Huaqun W. Insecurity of improved Anonymous multi-receiver identity-based encryption. The Computer Journal 2013. DOI: 10.1093/comjnl/bxt052. First published online: May 30, 2013.
    • (2013) The Computer Journal
    • Huaqun, W.1
  • 16
    • 84861702751 scopus 로고    scopus 로고
    • Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
    • Public Key Cryptography 2012 (PKC 2012), Fischlin M, Buchmann J, Manulis M (eds) Springer: London, UK, May
    • Libert B, Paterson KG, Quaglia EA. Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In Public Key Cryptography 2012 (PKC 2012), Fischlin M, Buchmann J, Manulis M (eds), Volume 7293 of Lecture Notes in Computer Science. Springer: London, UK, May 2012; 206-224.
    • (2012) Lecture Notes in Computer Science , vol.7293 , pp. 206-224
    • Libert, B.1    Paterson, K.G.2    Quaglia, E.A.3
  • 17
    • 84871547968 scopus 로고    scopus 로고
    • Computing on authenticated data: New privacy definitions and constructions
    • Asiacrypt 2012, Wang X, Sako K Springer: Beijing, China, December
    • Attrapadung N, Libert B, Peters T. Computing on authenticated data: New privacy definitions and constructions. In Asiacrypt 2012, Wang X, Sako K (eds), Volume 7658 of Lecture Notes on Computer Science. Springer: Beijing, China, December 2012; 367-385.
    • (2012) Lecture Notes on Computer Science , vol.7658 , pp. 367-385
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 18
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • Nguyen T, Kawamura T, Tahara Y, Ohsuga A. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security 2012; 6(1):20-27.
    • (2012) IET Information Security , vol.6 , Issue.1 , pp. 20-27
    • Nguyen, T.1    Kawamura, T.2    Tahara, Y.3    Ohsuga, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.