메뉴 건너뛰기




Volumn 9723, Issue , 2016, Pages 207-222

Generic anonymous identity-based broadcast encryption with chosen-ciphertext security

Author keywords

Anonymity; Chosen ciphertext security; Identity based broadcast encryption; Random oracle model; Robustness

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; RADIO BROADCASTING; RADIO COMMUNICATION; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; SIGNAL RECEIVERS;

EID: 84978900589     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-40367-0_13     Document Type: Conference Paper
Times cited : (10)

References (40)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • Shoup, V. (ed.), Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 3
    • 24144432124 scopus 로고    scopus 로고
    • Efficient multi-receiver identity-based encryption and its application to broadcast encryption
    • Vaudenay, S. (ed.), Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
    • (2005) PKC 2005. LNCS , vol.3386 , pp. 380-397
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 84978877626 scopus 로고    scopus 로고
    • Efficient identity-based key encapsulation to multiple parties
    • Barbosa, M., Farshim, P.: Efficient identity-based key encapsulation to multiple parties. In: IACR Cryptology ePrint Archive, 2005/217 (2005)
    • (2005) IACR Cryptology ePrint Archive , vol.2005 , pp. 217
    • Barbosa, M.1    Farshim, P.2
  • 5
    • 33750065702 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • Di Crescenzo, G., Rubin, A. (eds.), Springer, Heidelberg
    • Barth, A., Boneh, D., Waters, B.: Privacy in encrypted content distribution using private broadcast encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52-64. Springer, Heidelberg (2006)
    • (2006) FC 2006. LNCS , vol.4107 , pp. 52-64
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 6
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • Boyd, C. (ed.), Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
    • (2001) ASIACRYPT 2001. LNCS , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.), Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V. (ed.), Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 10
    • 85025586099 scopus 로고    scopus 로고
    • Multi-receiver identity-based key encapsulation with shortened ciphertext
    • Barua, R., Lange, T. (eds.), Springer, Heidelberg
    • Chatterjee, S., Sarkar, P.: Multi-receiver identity-based key encapsulation with shortened ciphertext. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 394-408. Springer, Heidelberg (2006)
    • (2006) INDOCRYPT 2006. LNCS , vol.4329 , pp. 394-408
    • Chatterjee, S.1    Sarkar, P.2
  • 11
    • 84859322276 scopus 로고    scopus 로고
    • Improved anonymous multi-receiver identity-based encryption
    • Chien, H.-Y.. Improved anonymous multi-receiver identity-based encryption. Comput. J. 55(4), 439-446 (2012)
    • (2012) Comput. J. , vol.55 , Issue.4 , pp. 439-446
    • Chien, H.-Y.1
  • 12
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Kurosawa, K. (ed.), Springer, Heidelberg
    • Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
    • (2007) ASIACRYPT 2007. LNCS , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 14
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Fan, C.-I., Huang, L.-Y., Ho, P.-H.. Anonymous multireceiver identity-based encryption. IEEE Trans. Comput. 59(9), 1239-1249 (2010)
    • (2010) IEEE Trans. Comput. , vol.59 , Issue.9 , pp. 1239-1249
    • Fan, C.-I.1    Huang, L.-Y.2    Ho, P.-H.3
  • 16
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R. (ed.), Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1993. LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 17
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • Joux, A. (ed.), Springer, Heidelberg
    • Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009. LNCS , vol.5479 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 19
    • 78651579171 scopus 로고    scopus 로고
    • Efficient identity-based broadcast encryption without random oracles
    • Liang, H., Liu, Z., Cheng, X.. Efficient identity-based broadcast encryption without random oracles. JCP 5(3), 331-336 (2010)
    • (2010) JCP , vol.5 , Issue.3 , pp. 331-336
    • Liang, H.1    Liu, Z.2    Cheng, X.3
  • 20
    • 84861593834 scopus 로고    scopus 로고
    • Privacy-preserving identity-based broadcast encryption
    • Hur, J., Park, C., Hwang, S.. Privacy-preserving identity-based broadcast encryption. Inf. Fusion 13(4), 296-303 (2012)
    • (2012) Inf. Fusion , vol.13 , Issue.4 , pp. 296-303
    • Hur, J.1    Park, C.2    Hwang, S.3
  • 21
    • 84878149442 scopus 로고    scopus 로고
    • An optimal identity-based broadcast encryption scheme for wireless sensor networks
    • Kim, I., Hwang, S.O.: An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans. 96-B(3), 891-895 (2013)
    • (2013) IEICE Trans. , vol.96 B , Issue.3 , pp. 891-895
    • Kim, I.1    Hwang, S.O.2
  • 22
    • 84890696263 scopus 로고    scopus 로고
    • Cryptanalysis of wang et al’.s improved anonymous multi-receiver identity-based encryption scheme
    • Li, H., Pang, L.. Cryptanalysis of wang et al’.s improved anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 8(1), 8-11 (2014)
    • (2014) IET Inf. Secur. , vol.8 , Issue.1 , pp. 8-11
    • Li, H.1    Pang, L.2
  • 24
    • 84904191000 scopus 로고    scopus 로고
    • Hierarchical identity-based broadcast encryption
    • Susilo, W., Mu, Y. (eds.), Springer, Heidelberg
    • Liu, W., Liu, J.,Wu, Q., Qin, B.: Hierarchical identity-based broadcast encryption. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 242-257. Springer, Heidelberg (2014)
    • (2014) ACISP 2014. LNCS , vol.8544 , pp. 242-257
    • Liu, W.1    Liu, J.2    Wu, Q.3    Qin, B.4
  • 25
    • 62649173578 scopus 로고    scopus 로고
    • Fully CCA2 secure identity based broadcast encryption without random oracles
    • Ren, Y., Dawu, G.. Fully CCA2 secure identity based broadcast encryption without random oracles. Inf. Process. Lett. 109(11), 527-533 (2009)
    • (2009) Inf. Process. Lett. , vol.109 , Issue.11 , pp. 527-533
    • Ren, Y.1    Dawu, G.2
  • 26
    • 84903887855 scopus 로고    scopus 로고
    • Fully anonymous identity-based broadcast encryption without random oracles
    • Ren, Y., Niu, Z., Zhang, X.. Fully anonymous identity-based broadcast encryption without random oracles. I. J. Netw. Sec. 16(4), 256-264 (2014)
    • (2014) I. J. Netw. Sec. , vol.16 , Issue.4 , pp. 256-264
    • Ren, Y.1    Niu, Z.2    Zhang, X.3
  • 27
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • May 13-17, 1990, Baltimore
    • Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore pp. 387-394 (1990)
    • (1990) Proceedings of the 22nd Annual ACM Symposium on Theory of Computing , pp. 387-394
    • Rompel, J.1
  • 29
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • Wang, H., Yi-Chun Zhang, H., Xiong, H., Qin, B.. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf, Sec. 6(1), 20-27 (2012)
    • (2012) IET Inf, Sec. , vol.6 , Issue.1 , pp. 20-27
    • Wang, H.1    Yi-Chun Zhang, H.2    Xiong, H.3    Qin, B.4
  • 30
    • 84874743396 scopus 로고    scopus 로고
    • Lattice-based identity-based broadcast encryption scheme
    • Wang, J., Bi, J.: Lattice-based identity-based broadcast encryption scheme. IACR Cryptology ePrint Archive, 2010/288 (2010)
    • (2010) IACR Cryptology ePrint Archive , vol.2010 , pp. 288
    • Wang, J.1    Bi, J.2
  • 31
    • 80053542582 scopus 로고    scopus 로고
    • New identity-based broadcast encryption with constant ciphertexts in the standard model
    • Qing, W., Wang, W.. New identity-based broadcast encryption with constant ciphertexts in the standard model. JSW 6(10), 1929-1936 (2011)
    • (2011) JSW , vol.6 , Issue.10 , pp. 1929-1936
    • Qing, W.1    Wang, W.2
  • 32
    • 84919657590 scopus 로고    scopus 로고
    • Efficient anonymous identity-based broadcast encryption without random oracles
    • Xie, L., Ren, Y.. Efficient anonymous identity-based broadcast encryption without random oracles. IJDCF 6(2), 40-51 (2014)
    • (2014) IJDCF , vol.6 , Issue.2 , pp. 40-51
    • Xie, L.1    Ren, Y.2
  • 33
    • 84904795474 scopus 로고    scopus 로고
    • Hierarchical identity-based broadcast encryption scheme from LWE
    • Yang, C., Zheng, S., Wang, L., Xiuhua, L., Yang, Y.. Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Netw. 16(3), 258-263 (2014)
    • (2014) J. Commun. Netw. , vol.16 , Issue.3 , pp. 258-263
    • Yang, C.1    Zheng, S.2    Wang, L.3    Xiuhua, L.4    Yang, Y.5
  • 35
    • 84978820797 scopus 로고    scopus 로고
    • Comment an anonymous multi-receiver identity-based encryption scheme
    • Zhang, J.H., Cui, Y.B.: Comment an anonymous multi-receiver identity-based encryption scheme. IACR Cryptology ePrint Archive, 2012/201 (2012)
    • (2012) IACR Cryptology ePrint Archive , vol.2012 , Issue.201
    • Zhang, J.H.1    Cui, Y.B.2
  • 36
    • 84922263039 scopus 로고    scopus 로고
    • An improved anonymous multi-receiver identity-based encryption scheme
    • Zhang, J., Mao, J.. An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4), 645-658 (2015)
    • (2015) Int. J. Commun. Syst. , vol.28 , Issue.4 , pp. 645-658
    • Zhang, J.1    Mao, J.2
  • 38
    • 84894159504 scopus 로고    scopus 로고
    • Anonymous identity-based broadcast encryption with adaptive security
    • Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.), Springer, Heidelberg
    • Zhang, L., Wu, Q., Mu, Y.: Anonymous identity-based broadcast encryption with adaptive security. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 258-271. Springer, Heidelberg (2013)
    • (2013) CSS 2013. LNCS , vol.8300 , pp. 258-271
    • Zhang, L.1    Wu, Q.2    Mu, Y.3
  • 39
    • 84880573517 scopus 로고    scopus 로고
    • Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation
    • Zhang, M., Takagi, T.. Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation. IEEE Syst. J. 7(3), 410-419 (2013)
    • (2013) IEEE Syst. J. , vol.7 , Issue.3 , pp. 410-419
    • Zhang, M.1    Takagi, T.2
  • 40
    • 84857361360 scopus 로고    scopus 로고
    • Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
    • Zhao, X., Zhang, F.. Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J. Syst. Softw. 85(3), 708-716 (2012)
    • (2012) J. Syst. Softw. , vol.85 , Issue.3 , pp. 708-716
    • Zhao, X.1    Zhang, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.