Open Access System for Information Sharing

Login Library

 

Article
Cited 4 time in webofscience Cited 7 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorSeo, JW-
dc.contributor.authorYum, DH-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-03-31T08:12:08Z-
dc.date.available2016-03-31T08:12:08Z-
dc.date.created2014-03-07-
dc.date.issued2013-05-
dc.identifier.issn0018-9448-
dc.identifier.other2013-OAK-0000029313-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/14785-
dc.description.abstractLibert and Vergnaud proposed a unidirectional proxy re-encryption scheme with temporary delegation (IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1786-1802, Mar. 2011). They claimed that the scheme is chosen ciphertext secure in the chosen key model. However, their proof has a minor error in the simulation of the re-encryption oracle. The adversary is able to distinguish between the simulated environment and the real attack environment by using responses from the re-encryption oracle. Fortunately, we can amend the proof without any modification of the original scheme.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION THEORY-
dc.titleComments on ""Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1109/TIT.2012.2236606-
dc.author.googleSeo, JW-
dc.author.googleYum, DH-
dc.author.googleLee, PJ-
dc.relation.volume59-
dc.relation.issue5-
dc.relation.startpage3256-
dc.relation.lastpage3256-
dc.contributor.id10051689-
dc.relation.journalIEEE TRANSACTIONS ON INFORMATION THEORY-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION THEORY, v.59, no.5, pp.3256 - 3256-
dc.identifier.wosid000318163500045-
dc.date.tcdate2019-01-01-
dc.citation.endPage3256-
dc.citation.number5-
dc.citation.startPage3256-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION THEORY-
dc.citation.volume59-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-84876755359-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc2-
dc.description.scptc3*
dc.date.scptcdate2018-05-121*
dc.type.docTypeEditorial Material-
dc.subject.keywordAuthorChosen ciphertext security-
dc.subject.keywordAuthorchosen key model-
dc.subject.keywordAuthorproxy re-encryption-
dc.subject.keywordAuthorsecurity proof-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse