DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, JW | - |
dc.contributor.author | Yum, DH | - |
dc.contributor.author | Lee, PJ | - |
dc.date.accessioned | 2016-03-31T08:12:08Z | - |
dc.date.available | 2016-03-31T08:12:08Z | - |
dc.date.created | 2014-03-07 | - |
dc.date.issued | 2013-05 | - |
dc.identifier.issn | 0018-9448 | - |
dc.identifier.other | 2013-OAK-0000029313 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/14785 | - |
dc.description.abstract | Libert and Vergnaud proposed a unidirectional proxy re-encryption scheme with temporary delegation (IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1786-1802, Mar. 2011). They claimed that the scheme is chosen ciphertext secure in the chosen key model. However, their proof has a minor error in the simulation of the re-encryption oracle. The adversary is able to distinguish between the simulated environment and the real attack environment by using responses from the re-encryption oracle. Fortunately, we can amend the proof without any modification of the original scheme. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.title | Comments on ""Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption | - |
dc.type | Article | - |
dc.contributor.college | 전자전기공학과 | - |
dc.identifier.doi | 10.1109/TIT.2012.2236606 | - |
dc.author.google | Seo, JW | - |
dc.author.google | Yum, DH | - |
dc.author.google | Lee, PJ | - |
dc.relation.volume | 59 | - |
dc.relation.issue | 5 | - |
dc.relation.startpage | 3256 | - |
dc.relation.lastpage | 3256 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION THEORY, v.59, no.5, pp.3256 - 3256 | - |
dc.identifier.wosid | 000318163500045 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 3256 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 3256 | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.citation.volume | 59 | - |
dc.contributor.affiliatedAuthor | Lee, PJ | - |
dc.identifier.scopusid | 2-s2.0-84876755359 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 2 | - |
dc.description.scptc | 3 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.type.docType | Editorial Material | - |
dc.subject.keywordAuthor | Chosen ciphertext security | - |
dc.subject.keywordAuthor | chosen key model | - |
dc.subject.keywordAuthor | proxy re-encryption | - |
dc.subject.keywordAuthor | security proof | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.