Mostra el registre d'ítem simple

dc.contributor.authorHerranz Sotoca, Javier
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Matemàtiques
dc.date.accessioned2016-04-21T12:03:25Z
dc.date.available2017-01-03T01:30:45Z
dc.date.issued2016-01
dc.identifier.citationHerranz, J. Attribute-based versions of Schnorr and ElGamal. "Applicable algebra in engineering communication and computing", Gener 2016, vol. 27, núm. 1, p. 17-57.
dc.identifier.issn0938-1279
dc.identifier.urihttp://hdl.handle.net/2117/86060
dc.descriptionThe final publication is available at Springer via http://dx.doi.org/10.1007/s00200-015-0270-7
dc.description.abstractWe design in this paper the first attribute-based cryptosystems that work in the classical discrete logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension of Schnorr signatures, with adaptive security relying on the discrete logarithm assumption, in the random oracle model. The attribute-based encryption schemes can be seen as extensions of ElGamal cryptosystem, with adaptive security relying on the decisional Diffie–Hellman assumption, in the standard model. The proposed schemes are secure only in a bounded model: the systems admit L secret keys, at most, for a bound L that must be fixed in the setup of the systems. The efficiency of the cryptosystems, later, depends on this bound L. Although this is an important drawback that can limit the applicability of the proposed schemes in some real-life applications, it turns out that the bounded security of our key-policy attribute-based encryption scheme (in particular, with L=1L=1) is enough to implement the generic transformation of Parno, Raykova and Vaikuntanathan at TCC’2012. As a direct result, we obtain a protocol for the verifiable delegation of computation of boolean functions, which does not employ pairings or lattices, and whose adaptive security relies on the decisional Diffie–Hellman assumption.
dc.format.extent41 p.
dc.language.isoeng
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Matemàtiques i estadística
dc.subject.lcshCryptography
dc.subject.otherAttribute-based cryptography
dc.subject.otherDiscrete Logarithm setting
dc.subject.otherverifiable computation
dc.titleAttribute-based versions of Schnorr and ElGamal
dc.typeArticle
dc.subject.lemacCriptografia
dc.contributor.groupUniversitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia
dc.identifier.doi10.1007/s00200-015-0270-7
dc.relation.publisherversionhttp://link.springer.com/article/10.1007%2Fs00200-015-0270-7
dc.rights.accessOpen Access
local.identifier.drac17502424
dc.description.versionPostprint (author's final draft)
local.citation.authorHerranz, J.
local.citation.publicationNameApplicable algebra in engineering communication and computing
local.citation.volume27
local.citation.number1
local.citation.startingPage17
local.citation.endingPage57


Fitxers d'aquest items

Thumbnail

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple