메뉴 건너뛰기




Volumn 10, Issue 3, 2015, Pages 679-693

Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext

Author keywords

broadcast encryption; cryptography; identity based broadcast encryption; public key

Indexed keywords

MOBILE SECURITY; SECURITY OF DATA;

EID: 84923249651     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2388156     Document Type: Article
Times cited : (65)

References (30)
  • 3
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, 2005, pp. 258-275.
    • Proc. CRYPTO, 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 4
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
    • Proc. ASIACRYPT, 2007 , pp. 200-215
    • Delerablée, C.1
  • 6
    • 85020598353 scopus 로고    scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
    • Proc. CRYPTO, 1984 , pp. 47-53
    • Shamir, A.1
  • 8
    • 33646823652 scopus 로고    scopus 로고
    • Efficient identity-based key encapsulation to multiple parties
    • M. Barbosa and P. Farshim, "Efficient identity-based key encapsulation to multiple parties," in Proc. IMA Int. Conf., 2005, pp. 428-441.
    • Proc. IMA Int. Conf., 2005 , pp. 428-441
    • Barbosa, M.1    Farshim, P.2
  • 13
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • S. Halevi, Ed. Berlin, Germany: Springer-Verlag
    • B. Waters, "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 5677, S. Halevi, Ed. Berlin, Germany: Springer-Verlag, 2009, pp. 619-636.
    • (2009) Advances in Cryptology (Lecture Notes in Computer Science) , vol.5677 , pp. 619-636
    • Waters, B.1
  • 14
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure HIBE with short ciphertexts
    • D. Micciancio, Ed. Berlin, Germany: Springer-Verlag
    • A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure HIBE with short ciphertexts," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5978, D. Micciancio, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 455-479.
    • (2010) Theory of Cryptography (Lecture Notes in Computer Science) , vol.5978 , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 15
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • H. Gilbert, Ed. Berlin, Germany: Springer-Verlag
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6110, H. Gilbert, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 62-91.
    • (2010) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 16
    • 79953232002 scopus 로고    scopus 로고
    • Identity-based encryption secure against selective opening attack
    • Y. Ishai, Ed. Berlin, Germany: Springer-Verlag
    • M. Bellare, B. Waters, and S. Yilek, "Identity-based encryption secure against selective opening attack," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 6597, Y. Ishai, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 235-252.
    • (2011) Theory of Cryptography (Lecture Notes in Computer Science) , vol.6597 , pp. 235-252
    • Bellare, M.1    Waters, B.2    Yilek, S.3
  • 17
    • 84858234376 scopus 로고    scopus 로고
    • Adaptively secure broadcast encryption with short ciphertexts
    • B. Malek and A. Miri, "Adaptively secure broadcast encryption with short ciphertexts," IJ Netw. Secur., vol. 14, no. 2, pp. 71-79, 2012.
    • (2012) IJ Netw. Secur. , vol.14 , Issue.2 , pp. 71-79
    • Malek, B.1    Miri, A.2
  • 18
    • 62649173578 scopus 로고    scopus 로고
    • Fully CCA2 secure identity based broadcast encryption without random oracles
    • May
    • Y. Ren and D. Gu, "Fully CCA2 secure identity based broadcast encryption without random oracles," Inf. Process. Lett., vol. 109, no. 11, pp. 527-533, May 2009.
    • (2009) Inf. Process. Lett. , vol.109 , Issue.11 , pp. 527-533
    • Ren, Y.1    Gu, D.2
  • 21
    • 84901650094 scopus 로고    scopus 로고
    • Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
    • P. Q. Nguyen and E. Oswald, Eds. Berlin, Germany: Springer-Verlag
    • N. Attrapadung, "Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 8441, P. Q. Nguyen and E. Oswald, Eds. Berlin, Germany: Springer-Verlag, 2014, pp. 557-577.
    • (2014) Advances in Cryptology (Lecture Notes in Computer Science) , vol.8441 , pp. 557-577
    • Attrapadung, N.1
  • 22
    • 84921399997 scopus 로고    scopus 로고
    • Low overhead broadcast encryption from multilinear maps
    • D. Boneh, B. Waters, and M. Zhandry, "Low overhead broadcast encryption from multilinear maps," IACR Cryptol. ePrint Archive, vol. 2014, p. 195, 2014.
    • (2014) IACR Cryptol. EPrint Archive , vol.2014 , pp. 195
    • Boneh, D.1    Waters, B.2    Zhandry, M.3
  • 23
    • 79952511284 scopus 로고    scopus 로고
    • Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
    • Paris, France May [Online]. Available
    • th Int. Conf. Pract. Theory Public Key Cryptography (PKC), vol. 6056. Paris, France, May 2010, pp. 384-402. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-13013-7
    • (2010) Proc. 13th Int. Conf. Pract. Theory Public Key Cryptography (PKC) , vol.6056 , pp. 384-402
    • Attrapadung, N.1    Libert, B.2
  • 25
    • 84880292433 scopus 로고    scopus 로고
    • Efficient and adaptively secure broadcast encryption systems
    • Aug.
    • M. Zhang, B. Yang, Z. Chen, and T. Takagi, "Efficient and adaptively secure broadcast encryption systems," Secur. Commun. Netw., vol. 6, no. 8, pp. 1044-1052, Aug. 2013.
    • (2013) Secur. Commun. Netw. , vol.6 , Issue.8 , pp. 1044-1052
    • Zhang, M.1    Yang, B.2    Chen, Z.3    Takagi, T.4
  • 26
    • 82755161855 scopus 로고    scopus 로고
    • Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    • Jan.
    • L. Zhang, Y. Hu, and Q. Wu, "Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups," Math. Comput. Model., vol. 55, nos. 1-2, pp. 12-18, Jan. 2012.
    • (2012) Math. Comput. Model. , vol.55 , Issue.1-2 , pp. 12-18
    • Zhang, L.1    Hu, Y.2    Wu, Q.3
  • 27
    • 79958006339 scopus 로고    scopus 로고
    • Unbounded HIBE and attribute-based encryption
    • K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag
    • A. Lewko and B. Waters, "Unbounded HIBE and attribute-based encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632, K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 547-567.
    • (2011) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6632 , pp. 547-567
    • Lewko, A.1    Waters, B.2
  • 28
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • J. Kilian, Ed. Berlin, Germany: Springer-Verlag
    • D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 3378, J. Kilian, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 325-341.
    • (2005) Theory of Cryptography (Lecture Notes in Computer Science) , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 29
    • 84879866739 scopus 로고    scopus 로고
    • Comparing the pairing efficiency over compositeorder and prime-order elliptic curves
    • M. Jacobson, Jr., M. Locasto, P. Mohassel, and R. Safavi-Naini, Eds. Berlin, Germany: Springer-Verlag
    • A. Guillevic, "Comparing the pairing efficiency over compositeorder and prime-order elliptic curves," in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 7954, M. Jacobson, Jr., M. Locasto, P. Mohassel, and R. Safavi-Naini, Eds. Berlin, Germany: Springer-Verlag, 2013, pp. 357-372.
    • (2013) Applied Cryptography and Network Security (Lecture Notes in Computer Science) , vol.7954 , pp. 357-372
    • Guillevic, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.