Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Seong Oun | - |
dc.contributor.author | Le, Minh-Ha | - |
dc.date.available | 2020-07-10T04:40:31Z | - |
dc.date.created | 2020-07-06 | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 1064-1246 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/4748 | - |
dc.description.abstract | Telco systems usually run large-scale, centralized key management systems. However, centralized approaches based on conventional public key encryption like RSA raise problems such as key escrow, secure channel to delivery key, and third-party query as well as single point of failure. To address these problems, we propose both certificate-based encryption (CBE) and hierarchical certificate-based encryption (HCBE) schemes proved secure in the standard model. Compared with other schemes, our schemes are proved IND-CCA2 (Indistinguishability under Adaptive Chosen Ciphertext Attack) secure in full model, where the number of group elements is independent of the value of security parameter. As far as we know, the proposed HCBE is the first fully IND-CCA2 secure scheme with ciphetexts of constant size. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IOS PRESS | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | GENERIC CONSTRUCTION | - |
dc.title | Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.doi | 10.3233/JIFS-169838 | - |
dc.identifier.scopusid | 2-s2.0-85059441886 | - |
dc.identifier.wosid | 000459214900017 | - |
dc.identifier.bibliographicCitation | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp.5971 - 5981 | - |
dc.relation.isPartOf | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS | - |
dc.citation.title | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS | - |
dc.citation.volume | 35 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 5971 | - |
dc.citation.endPage | 5981 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | GENERIC CONSTRUCTION | - |
dc.subject.keywordAuthor | Certificate-based encryption | - |
dc.subject.keywordAuthor | hierarchical certificate-based encryption | - |
dc.subject.keywordAuthor | identity-based encryption | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.