logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 1: 019101(2017) https://doi.org/10.1007/s11432-015-0994-0

Attribute-based non-interactive key exchange

More info
  • ReceivedDec 9, 2015
  • AcceptedFeb 3, 2016
  • PublishedMay 16, 2016

Abstract


Funded by

Strategic Priority Research Program of the Chinese Academy of Sciences(XDA06010703)

. The work of Hongda Li was supported by National Natural Science Foundation of China(60970139)


Acknowledgment

Acknowledgments

The work of Rui Zhang was supported by Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010703). The work of Hongda Li was supported by National Natural Science Foundation of China (Grant No. 60970139).


References

[1] Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22: 644-654 CrossRef Google Scholar

[2] Freire E S V, Hofheinz D, Kiltz E, et al. Non-interactive key exchange. In: Public-Key Cryptography --- PKC 2013. Berlin: Springer, 2013. 254--271. Google Scholar

[3] Boneh D, Zhandry M. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Advances in Cryptology --- CRYPTO 2014. Berlin: Springer, 2014. 480--499. Google Scholar

[4] Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of the Symposium on Cryptography and Information Security, Okinawa, 2000. 135--148. Google Scholar

[5] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, 2006. 89--98. Google Scholar

[6] Ananth P, Boneh D, Garg S, et al. Deffering-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689. http://eprint.iacr.org/. 2013. Google Scholar

[7] Boyle E, Chung K M, Pass R. On extractability obfuscation. In: Theory of Cryptography. Berlin: Springer, 2014. 52--73. Google Scholar

[8] Sahai A, Waters B. How to use indistinguishability obfuscation: deniable encryption, and more. In: Proceedings of the 46th Annual Symposium on Theory of Computing (STOC 2014). New York: ACM, 2014. 475--484. Google Scholar

[9] Goldwasser S, Micali S, Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17: 281-308 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1