메뉴 건너뛰기




Volumn 4329 LNCS, Issue , 2006, Pages 379-393

Secure cryptographic workflow in the standard model

Author keywords

Cryptographic workflow; Identity Based encryption; Key encapsulation; Secret sharing

Indexed keywords

NETWORK SECURITY;

EID: 84973899018     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11941378_27     Document Type: Conference Paper
Times cited : (14)

References (28)
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public-Key Cryptography
    • LNCS 2894:, Springer-Verlag, 2003
    • S.S. Al-Riyami and K.G. Paterson. Certificateless Public-Key Cryptography. Advances in Cryptology - ASIACRYPT 2003, LNCS 2894:452–473. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology - ASIACRYPT , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 3
    • 85025662011 scopus 로고    scopus 로고
    • Secure Cryptographic Workflow in the Standard Model
    • Cryptology ePrint Archive, Report 2006/???
    • M. Barbosa and P. Farshim. Secure Cryptographic Workflow in the Standard Model. Full Version. Cryptology ePrint Archive, Report 2006/???. 2006.
    • (2006) Full Version
    • Barbosa, M.1    Farshim, P.2
  • 4
    • 0842283854 scopus 로고    scopus 로고
    • Randomness Re-Use in Multi-Recipient Encryption Schemes
    • LNCS 2567, Springer-Verlag, 2003
    • M. Bellare, A. Boldyreva and J. Staddon. Randomness Re-Use in Multi-Recipient Encryption Schemes. Public Key Cryptography - PKC 2003, LNCS 2567:85–99. Springer-Verlag, 2003.
    • (2003) Public Key Cryptography - PKC , pp. 85-99
    • Bellare, M.1    Boldyreva, A.2    Staddon, J.3
  • 5
    • 85027202957 scopus 로고
    • Generalized Secret Sharing and Monotone Functions
    • LNCS 403, Springer-Verlag
    • J. Benaloh and J. Leichter. Generalized Secret Sharing and Monotone Functions. Advances in Cryptology - CRYPTO ’88, LNCS 403:27–35. Springer-Verlag, 1990.
    • (1990) Advances in Cryptology - CRYPTO ’88 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing, 32:586–615. 2003.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 24944502031 scopus 로고    scopus 로고
    • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
    • Report 2004/261
    • D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Cryptology ePrint Archive, Report 2004/261, 2004.
    • (2004) Cryptology Eprint Archive
    • Boneh, D.1    Katz, J.2
  • 10
    • 35048839958 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Report 2003/182
    • R. Canetti, S. Halevi and J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. Cryptology ePrint Archive, Report 2003/182, 2003.
    • (2003) Cryptology Eprint Archive
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 11
    • 33645751214 scopus 로고    scopus 로고
    • Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme
    • LNCS 3796, Springer-Verlag
    • L. Chen and Z. Cheng. Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme. Cryptography and Coding, LNCS 3796:442–459. Springer-Verlag, 2005.
    • (2005) Cryptography and Coding , pp. 442-459
    • Chen, L.1    Cheng, Z.2
  • 12
    • 33645583371 scopus 로고    scopus 로고
    • Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves
    • HPL-2003-48, HP Laboratories
    • L. Chen and K. Harrison. Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves. Technical Report, HPL-2003-48, HP Laboratories, 2003.
    • (2003) Technical Report
    • Chen, L.1    Harrison, K.2
  • 13
    • 84944050090 scopus 로고    scopus 로고
    • Applications of Multiple Trusted Authorities in Pairing Based Cryptosystems
    • LNCS 2437, Springer-Verlag
    • L. Chen, K. Harrison, D. Soldera and N.P. Smart. Applications of Multiple Trusted Authorities in Pairing Based Cryptosystems. Proceedings InfraSec 2002, LNCS 2437:260–275. Springer-Verlag, 2002.
    • (2002) Proceedings Infrasec 2002 , pp. 260-275
    • Chen, L.1    Harrison, K.2    Soldera, D.3    Smart, N.P.4
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public-Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
    • LNCS 1462, Springer-Verlag
    • R. Cramer and V. Shoup,. A Practical Public-Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. Advances in Cryptology - CRYPTO ’98, LNCS 1462:13–25. Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - CRYPTO ’98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 15
    • 33646842805 scopus 로고    scopus 로고
    • A Designer’s Guide to KEMs
    • LNCS 2898,. Springer-Verlag
    • A.W. Dent. A Designer’s Guide to KEMs. Coding and Cryptography, LNCS 2898:133–151. Springer-Verlag, 2003.
    • (2003) Coding and Cryptography , pp. 133-151
    • Dent, A.W.1
  • 16
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security of Multiple Encryption
    • LNCS 3378, Springer-Verlag, 2005
    • Y. Dodis and J. Katz. Chosen-Ciphertext Security of Multiple Encryption. TCC 2005, LNCS 3378:188–209. Springer-Verlag, 2005.
    • (2005) TCC , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 17
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • LNCS 4004, Springer-Verlag
    • C. Gentry. Practical identity-based encryption without random oracles. Advances in Cryptology - EUROCRYPT 2006, LNCS 4004:445–464. Springer-Verlag, 2006.
    • (2006) Advances in Cryptology - EUROCRYPT 2006 , pp. 445-464
    • Gentry, C.1
  • 18
    • 78650256253 scopus 로고    scopus 로고
    • KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
    • Report 2006/265
    • J. Herranz and D. Hofheinz and E. Kiltz. KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption. Cryptology ePrint Archive, Report 2006/265. 2006.
    • (2006) Cryptology Eprint Archive
    • Herranz, J.1    Hofheinz, D.2    Kiltz, E.3
  • 20
    • 38049004199 scopus 로고    scopus 로고
    • Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
    • Report 2006/1221s
    • E. Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive, Report 2006/1221s, 2006.
    • (2006) Cryptology Eprint Archive
    • Kiltz, E.1
  • 22
    • 77951259506 scopus 로고    scopus 로고
    • On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
    • Report 2006/268
    • W. Nagao, Y. Manabe and T. Okamoto. On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. Cryptology ePrint Archive, Report 2006/268. 2006.
    • (2006) Cryptology Eprint Archive
    • Nagao, W.1    Manabe, Y.2    Okamoto, T.3
  • 23
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from Pairings: A Snapshot of Current Research
    • K.G. Paterson. Cryptography from Pairings: A Snapshot of Current Research. Information Security Technical Report, 7:41–54, 2002.
    • (2002) Information Security Technical Report , vol.7 , pp. 41-54
    • Paterson, K.G.1
  • 24
    • 33645585449 scopus 로고    scopus 로고
    • ID-Based Cryptosystems with Pairing on Elliptic Curve
    • Report 2003/054
    • R. Sakai and M. Kasahara. ID-Based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive, Report 2003/054, 2003.
    • (2003) Cryptology Eprint Archive
    • Sakai, R.1    Kasahara, M.2
  • 25
  • 26
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • LNCS 196, Springer-Verlag
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Proceedings of CRYPTO ’84 on Advances in Cryptology, LNCS 196:47–53. Springer-Verlag, 1985.
    • (1985) Proceedings of CRYPTO ’84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 27
    • 35248891001 scopus 로고    scopus 로고
    • Access Control Using Pairing Based Cryptography
    • LNCS 2612, Springer-Verlag
    • N.P. Smart. Access Control Using Pairing Based Cryptography. Topics in Cryptology - CT-RSA 2003, LNCS 2612:111–121. Springer-Verlag, 2003.
    • (2003) Topics in Cryptology - CT-RSA 2003 , pp. 111-121
    • Smart, N.P.1
  • 28
    • 33750058631 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Report 2004/180
    • B.R. Waters. Efficient Identity-Based Encryption Without Random Oracles. Cryptology ePrint Archive, Report 2004/180, 2004.
    • (2004) Cryptology Eprint Archive
    • Waters, B.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.