메뉴 건너뛰기




Volumn 2513, Issue , 2002, Pages 85-96

Unconditionally secure key insulated cryptosystems: Models, bounds and constructions

Author keywords

[No Author keywords available]

Indexed keywords

CONCRETES; NETWORK SECURITY;

EID: 84944080373     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36159-6_8     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 1
    • 84937427768 scopus 로고    scopus 로고
    • A New Forward-Secure Digital Signature Scheme
    • Springer-Verlag
    • M. Abdalla and L. Reyzin, “A New Forward-Secure Digital Signature Scheme,” Proc. of Asiacrypt 2000, LNCS 1976, Springer-Verlag, pp. 116-129,2000.
    • (2000) Proc. Of Asiacrypt 2000, LNCS , vol.1976 , pp. 116-129
    • Abdalla, M.1    Reyzin, L.2
  • 3
    • 79958074367 scopus 로고    scopus 로고
    • A Forward-Secure Digital Signature Scheme
    • Springer-Verlag
    • M. Bellare and S.K. Miner, “A Forward-Secure Digital Signature Scheme,” Proc. of CRYPTO’99, LNCS 1666, Springer-Verlag, pp. 431-448, 1999.
    • (1999) Proc. Of CRYPTO’99, LNCS , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.K.2
  • 4
    • 0020890723 scopus 로고
    • Non-public Key Distribution
    • Plenum Press
    • R. Blom, “Non-public Key Distribution,” Proc. of CRYPTO’82, Plenum Press, pp.231-236, 1983.
    • (1983) Proc. Of CRYPTO’82 , pp. 231-236
    • Blom, R.1
  • 6
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
    • LNCS, Springer- Verlag
    • C. Blundo, L.A. Frota Mattos and D.R. Stinson, “Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,” Proc. of CRYPTO’96, LNCS 1109, Springer- Verlag, pp.387-400, 1996.
    • (1996) Proc. Of CRYPTO’96 , vol.1109 , pp. 387-400
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Springer-Verlag
    • D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. of CRYPTO 2001, LNCS 2139, Springer-Verlag, pp.213-229, 2001.
    • (2001) Proc. Of CRYPTO 2001, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 84957712291 scopus 로고    scopus 로고
    • An Efficient Threshold Public-Key Cryptosystem secure against adaptive chosen-ciphertext attack
    • Springer-Verlag
    • R. Canetti and S. Goldwasser, “An Efficient Threshold Public-Key Cryptosystem secure against adaptive chosen-ciphertext attack,” Proc. of Eurocrypt’99, LNCS 1592, Springer-Verlag, pp.90-106, 1999.
    • (1999) Proc. Of Eurocrypt’99, LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 9
    • 77950151506 scopus 로고    scopus 로고
    • An Identity Based Encryption Scheme Based on Quadratic Residues
    • Springer- Verlag
    • C. Cocks, “An Identity Based Encryption Scheme Based on Quadratic Residues,” Proc. of IMA Int. Conf. 2001, Coding and Cryptography, LNCS 2260, Springer- Verlag, pp. 360-363, 2001.
    • (2001) Proc. Of IMA Int. Conf. 2001, Coding and Cryptography, LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 10
    • 84947254092 scopus 로고    scopus 로고
    • Key-Insulated Public Key Cryptosystems
    • LNCS, Springer-Verlag
    • Y. Dodis, J. Katz, S. Xu and M. Yung, “Key-Insulated Public Key Cryptosystems,” Proc. of Eurocrypt 2002, LNCS 2332, Springer-Verlag, pp.65-82, 2002.
    • (2002) Proc. Of Eurocrypt 2002 , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 11
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Springer-Verlag
    • A. Fiat and M. Naor, “Broadcast Encryption,” Proc. of CRYPTO’93, LNCS 773, Springer-Verlag, pp.480-491, 1994.
    • (1994) Proc. Of CRYPTO’93, LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 12
    • 84956861571 scopus 로고    scopus 로고
    • An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks
    • Springer-Verlag
    • G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, “An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks,” Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag, pp.348-362, 1999.
    • (1999) Proc. Of Asiacrypt’99, LNCS , vol.1716 , pp. 348-362
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 13
    • 84947803330 scopus 로고    scopus 로고
    • Some Bounds and a Construction for Secure Broadcast Encryption
    • Springer-Verlag
    • K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, “Some Bounds and a Construction for Secure Broadcast Encryption,” Proc. of Asiacrypt’98, LNCS 1514, Springer-Verlag, pp.420-433, 1998.
    • (1998) Proc. Of Asiacrypt’98, LNCS , vol.1514 , pp. 420-433
    • Kurosawa, K.1    Yoshida, T.2    Desmedt, Y.3    Burmester, M.4
  • 14
    • 84989455644 scopus 로고
    • On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem
    • Springer-Verlag
    • T. Matsumoto and H. Imai, “On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem,” Proc. of CRYPTO’87, LNCS 293, Springer-Verlag, pp.185-193, 1987.
    • (1987) Proc. Of CRYPTO’87, LNCS , vol.293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 15
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Springer-Verlag
    • A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. of CRYPTO’84, LNCS 196, Springer-Verlag, pp.47-53, 1985.
    • (1985) Proc. Of CRYPTO’84, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 16
    • 84888872516 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems Against Chosen- Ciphertext Attack
    • Springer-Verlag
    • V. Shoup and R. Gennaro, “Securing Threshold Cryptosystems Against Chosen- Ciphertext Attack,” Proc. of Eurocrypt’99, LNCS 1403, Springer-Verlag, pp.1-16, 1998.
    • (1998) Proc. Of Eurocrypt’99, LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 17
    • 0000028420 scopus 로고    scopus 로고
    • On Some Methods for Unconditionally Secure Key distribution and broadcast encryption
    • D.R. Stinson, “On Some Methods for Unconditionally Secure Key distribution and broadcast encryption,” Designs, Codes and Cryptography, 12, pp.215-243, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 18
    • 84944048103 scopus 로고    scopus 로고
    • Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
    • Springer- Verlag
    • D.R. Stinson and R. Wei, “Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures,” Proc. SAC’99, LNCS 1758, Springer- Verlag, pp.200-214, 1999.
    • (1999) Proc. SAC’99, LNCS , vol.1758 , pp. 200-214
    • Stinson, D.R.1    Wei, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.