메뉴 건너뛰기




Volumn 44, Issue , 2016, Pages 117-121

Fully secure fuzzy identity-based encryption for secure IoT communications

Author keywords

Fuzzy identity based encryption; Internet of things; Secure communications; Standard model; Tight reduction

Indexed keywords

CRYPTOGRAPHY; SECURE COMMUNICATION;

EID: 84947798047     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2015.06.007     Document Type: Article
Times cited : (43)

References (29)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput. Netw. 54 15 2010 2787 2805
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology 1985 Springer 47 53
    • (1985) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer
    • D. Boneh, X. Boyen, and E.-J. Goh Hierarchical identity based encryption with constant size ciphertext Advances in Cryptology - EUROCRYPT 2005 2005 Springer 440 456
    • (2005) Advances in Cryptology - EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 5
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer
    • B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology - EUROCRYPT 2005 2005 Springer 114 127
    • (2005) Advances in Cryptology - EUROCRYPT 2005 , pp. 114-127
    • Waters, B.1
  • 6
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Springer
    • C. Gentry Practical identity-based encryption without random oracles Advances in Cryptology - EUROCRYPT 2006 2006 Springer 445 464
    • (2006) Advances in Cryptology - EUROCRYPT 2006 , pp. 445-464
    • Gentry, C.1
  • 7
    • 85025629535 scopus 로고    scopus 로고
    • Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
    • Springer
    • J. Weng, S. Liu, K. Chen, and C. Ma Identity-based parallel key-insulated encryption without random oracles: security notions and construction Progress in Cryptology - INDOCRYPT 2006 2006 Springer 409 423
    • (2006) Progress in Cryptology - INDOCRYPT 2006 , pp. 409-423
    • Weng, J.1    Liu, S.2    Chen, K.3    Ma, C.4
  • 8
    • 43149100586 scopus 로고    scopus 로고
    • Identity-based threshold key-insulated encryption without random oracles
    • Springer
    • J. Weng, S. Liu, K. Chen, D. Zheng, and W. Qiu Identity-based threshold key-insulated encryption without random oracles Topics in Cryptology - CT-RSA 2008 2008 Springer 203 220
    • (2008) Topics in Cryptology - CT-RSA 2008 , pp. 203-220
    • Weng, J.1    Liu, S.2    Chen, K.3    Zheng, D.4    Qiu, W.5
  • 9
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Springer
    • B. Waters Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions Advances in Cryptology - CRYPTO 2009 2009 Springer 619 636
    • (2009) Advances in Cryptology - CRYPTO 2009 , pp. 619-636
    • Waters, B.1
  • 10
    • 84874314815 scopus 로고    scopus 로고
    • Accountable authority identity-based encryption with public traceability
    • Springer
    • J. Lai, R.H. Deng, Y. Zhao, and J. Weng Accountable authority identity-based encryption with public traceability Topics in Cryptology - CT-RSA 2013 2013 Springer 326 342
    • (2013) Topics in Cryptology - CT-RSA 2013 , pp. 326-342
    • Lai, J.1    Deng, R.H.2    Zhao, Y.3    Weng, J.4
  • 11
    • 84901673593 scopus 로고    scopus 로고
    • Identity-based encryption secure against selective opening chosen-ciphertext attack
    • Springer
    • J. Lai, R.H. Deng, S. Liu, J. Weng, and Y. Zhao Identity-based encryption secure against selective opening chosen-ciphertext attack Advances in Cryptology - EUROCRYPT 2014 2014 Springer 77 92
    • (2014) Advances in Cryptology - EUROCRYPT 2014 , pp. 77-92
    • Lai, J.1    Deng, R.H.2    Liu, S.3    Weng, J.4    Zhao, Y.5
  • 16
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Springer
    • M. Bellare, A. Boldyreva, and A. Palacio An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Advances in Cryptology - EUROCRYPT 2004 2004 Springer 171 188
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 18
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 19
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 20
    • 78650287972 scopus 로고    scopus 로고
    • New fuzzy identity-based encryption in the standard model
    • Y. Ren, D. Gu, S. Wang, and X. Zhang New fuzzy identity-based encryption in the standard model Informatica 21 3 2010 393 407
    • (2010) Informatica , vol.21 , Issue.3 , pp. 393-407
    • Ren, Y.1    Gu, D.2    Wang, S.3    Zhang, X.4
  • 21
    • 84863645850 scopus 로고    scopus 로고
    • Cryptanalysis of a fuzzy identity based encryption scheme in the standard model
    • X.A. Wang, X. Yang, M. Zhang, and Y. Yu Cryptanalysis of a fuzzy identity based encryption scheme in the standard model Informatica 23 2 2012 299 314
    • (2012) Informatica , vol.23 , Issue.2 , pp. 299-314
    • Wang, X.A.1    Yang, X.2    Zhang, M.3    Yu, Y.4
  • 23
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Springer
    • M. Chase Multi-authority attribute based encryption Theory of Cryptography 2007 Springer 515 534
    • (2007) Theory of Cryptography , pp. 515-534
    • Chase, M.1
  • 25
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Springer
    • D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys Advances in Cryptology - CRYPTO 2005 2005 Springer 258 275
    • (2005) Advances in Cryptology - CRYPTO 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 27
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • IEEE
    • A. Sahai Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security 40th Annual Symposium on Foundations of Computer Science, 1999 1999 IEEE 543 553
    • (1999) 40th Annual Symposium on Foundations of Computer Science, 1999 , pp. 543-553
    • Sahai, A.1
  • 28
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • Springer
    • D. Boneh, and J. Katz Improved efficiency for CCA-secure cryptosystems built using identity-based encryption Topics in Cryptology - CT-RSA 2005 2005 Springer 87 103
    • (2005) Topics in Cryptology - CT-RSA 2005 , pp. 87-103
    • Boneh, D.1    Katz, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.