Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)

From MaRDI portal
Revision as of 06:07, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3627434

DOI10.1007/978-3-642-01001-9_10zbMath1239.94073OpenAlexW1806049065MaRDI QIDQ3627434

Brent Waters, Craig Gentry

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_10




Related Items

Efficient subtree-based encryption for fuzzy-entity data sharingBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinAsymptotically tight lower bounds in anonymous broadcast encryption and authenticationOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceBroadcast encryption based non-interactive key distribution in MANETsAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionComplete tree subset difference broadcast encryption scheme and its analysisMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessSecure and Efficient Construction of Broadcast Encryption with DealershipKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationConstructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key FrameworkReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingAnonymous certificate-based broadcast encryption with constant decryption costHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsProvably secure threshold public-key encryption with adaptive security and short ciphertextsAdaptively Secure Broadcast Encryption with DealershipFunctional broadcast encryption with applications to data sharing for cloud storageEfficient anonymous multi-group broadcast encryptionA note on the security of KHL schemeSecurity Notions for Broadcast EncryptionMobile access and flexible search over encrypted cloud data in heterogeneous systemsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionDéjà Q: Encore! Un Petit IBEHow to Avoid Obfuscation Using Witness PRFsGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityAnonymous Identity-Based Broadcast Encryption with Revocation for File SharingOptimal broadcast encryption from pairings and LWEMore Efficient Constructions for Inner-Product EncryptionFully Distributed Broadcast EncryptionIdentity-Based Trace and Revoke SchemesDynamic broadcast encryption scheme with revoking userSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolIdentity-based broadcast encryption with continuous leakage resilienceA performance evaluation of pairing-based broadcast encryption systemsAnonymous trace and revoke



Cites Work


This page was built for publication: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)