Anonymous certificate-based broadcast encryption with constant decryption cost
From MaRDI portal
Publication:2195299
Recommendations
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
- Improved anonymous broadcast encryptions -- tight security and shorter ciphertext
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
Cites work
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 2009961 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Continuous leakage-resilient certificate-based encryption
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Efficient Adaptively Secure IBBE From the SXDH Assumption
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Identity-based broadcast encryption with continuous leakage resilience
- Identity-based cryptosystems and signature schemes
- Low overhead broadcast encryption from multilinear maps
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Provably secure certificate-based encryption with leakage resilience
- Provably secure certificate-based signature scheme without pairings
- Public key broadcast encryption for stateless receivers
Cited in
(10)- Key-policy attribute-based encryption against continual auxiliary input leakage
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication
- Improved anonymous broadcast encryptions -- tight security and shorter ciphertext
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Anonymous certificateless multi-receiver encryption scheme for smart community management systems
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
This page was built for publication: Anonymous certificate-based broadcast encryption with constant decryption cost
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2195299)