ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security |
Koo, Woo-Kwon
(Graduate School of Information Management & Security, Korea University)
Hwang, Jung-Yeon (Graduate School of Information Management & Security, Korea University) Kim, Hyoung-Joong (Graduate School of Information Management & Security, Korea University) Lee, Dong-Hoon (Graduate School of Information Management & Security, Korea University) |
1 | M. Blaze, G. Bleumer, M. Strauss, 'Divertible protocols and atomic proxy cryptography', In: Proceedings of Eurocrypt '98. Volume 1403. (1998) 127–44 DOI ScienceOn |
2 | R. Canetti, S. Halevi, J. Katz., 'Chosen- Ciphertext Security from Identity-Based Encryption', In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–.222. Springer, Heidelberg (2004) DOI ScienceOn |
3 | R. Canetti, S. Hohenberger, 'Chosen-Ciphertext Secure Proxy Re-Encryption', In: ACM CCS 2007, pp. 185–.194. New York (2007) |
4 | E. Fujisaki, T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes' In: Proceedings of Crypto '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 537–54 DOI |
5 | M. Green, G. Ateniese, 'Identity-Based Proxy Re-encryption', In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–.306. Springer, Heidelberg (2007) DOI ScienceOn |
6 | G. Ateniese, K, Fu, M. Green, S. Hohenberger, 'Improved proxy re-encryption schemes with applications to secure distributed storage', ACM TISSEC 9(1), 1–.30 (2006) DOI |
7 | M. Mambo, E. Okamoto,: Proxy Cryptosystems, 'Delegation of the Power to Decrypt Ciphertexts', IEICE Trans. Fund. Elect. Communications and CS, E80-A/1, 54–.63 (1997) |
8 | B. Libert, D. Vergnaud,, 'Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption', In: PKC 2008. LNCS, vol. 4939, pp. 360–.379. Springer, Heidelberg (2008) DOI ScienceOn |
9 | T. Matsuo, 'Proxy Re-encryption Systems for Identity-Based Encryption', In: Pairing 2007. LNCS, vol. 4575, pp. 247–.367. Springer, Heidelberg DOI ScienceOn |
10 | Y. Dodis, A. Ivan, 'Proxy cryptography revisited', In: Proceedings of the Tenth Network and Distributed System Security Symposium. (2003) |
11 | P. Yang, T. Kitagawa, G. Hanaoka, R. Zhang, K. Matsurra, H. Imai, 'Applying Fugisaki-Okamoto to Identity-Based Encryption,' Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-16). LNCS, vol. 3857, pp. 183–192. Springer, Heidelberg (2006) DOI ScienceOn |
12 | D. Boneh, M. Franklin, 'Identity-based encryption from the Weil pairing', In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–.229. Springer, Heidelberg (2001) DOI ScienceOn |
13 | G. Ateniese, K. Fu, M. Green and S. Hohenberger, 'Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage', In: NDSS (2005) |
14 | D. Boneh, E.J. Goh, T. Matsuo, 'Proposal for P1363.3 Proxy Re-encryption' (http: //grouper.ieee.org/groups/1363/IBC/submissions/NTTDataProposalfor-P1363.3-2006-09-01.pdf) |