Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
From MaRDI portal
Publication:2290624
DOI10.1016/j.tcs.2019.11.035zbMath1448.94237OpenAlexW2991189023WikidataQ121141399 ScholiaQ121141399MaRDI QIDQ2290624
Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang, Yu Pu Hu
Publication date: 29 January 2020
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2019.11.035
accountable authoritypublic traceabilityconstant-size ciphertextsconstant-size private keysIdentity-based broadcast encryption (IBBE)weak black-box
Related Items (2)
A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ Fully anonymous identity-based broadcast signcryption with public verification
Cites Work
- Unnamed Item
- Making \textit{any} attribute-based encryption accountable, efficiently
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
- Fully Secure Accountable-Authority Identity-Based Encryption
- On Probabilistic versus Deterministic Provers in the Definition of Proofs of Knowledge
- Traceable and Retrievable Identity-Based Encryption
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Accountable Authority Identity-Based Encryption with Public Traceability
- Making Any Identity-Based Encryption Accountable, Efficiently
- Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Efficient Non-interactive Proof Systems for Bilinear Groups
This page was built for publication: Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts