Pages that link to "Item:Q3627434"
From MaRDI portal
The following pages link to Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434):
Displaying 39 items.
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Complete tree subset difference broadcast encryption scheme and its analysis (Q1934221) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- A performance evaluation of pairing-based broadcast encryption systems (Q2096602) (← links)
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin (Q2139632) (← links)
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication (Q2149789) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- Anonymous certificate-based broadcast encryption with constant decryption cost (Q2195299) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Efficient anonymous multi-group broadcast encryption (Q2229276) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- Anonymous trace and revoke (Q2349640) (← links)
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service (Q2666761) (← links)
- Déjà Q: Encore! Un Petit IBE (Q2799097) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- More Efficient Constructions for Inner-Product Encryption (Q2822673) (← links)
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness (Q2953817) (← links)
- Secure and Efficient Construction of Broadcast Encryption with Dealership (Q2953866) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Dynamic broadcast encryption scheme with revoking user (Q4981096) (← links)
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication (Q6101280) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)