Public key broadcast encryption for stateless receivers
From MaRDI portal
Publication:3082983
DOI10.1007/978-3-540-44993-5_5zbMATH Open1327.94041OpenAlexW1793265733MaRDI QIDQ3082983FDOQ3082983
Authors: Yevgeniy Dodis, Nelly Fazio
Publication date: 18 March 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-44993-5_5
Recommendations
- scientific article; zbMATH DE number 1942412
- On the mean number of encryptions for tree-based broadcast encryption schemes
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- scientific article; zbMATH DE number 1024079
- A Revocation Scheme with Minimal Storage at Receivers
Cited In (60)
- Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography
- Information Security and Privacy
- A multivariate identity-based broadcast encryption with applications to the Internet of Things
- Advances in Cryptology - ASIACRYPT 2003
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- Unique-path identity based encryption with applications to strongly secure messaging
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Complete tree subset difference broadcast encryption scheme and its analysis
- An efficient IBE scheme with tight security reduction in the random oracle model
- Identity-based broadcast encryption with shorter transmissions
- On the mean number of encryptions for tree-based broadcast encryption schemes
- Secure and efficient construction of broadcast encryption with dealership
- Proxy signature with revocation
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Information Security
- Revocable hierarchical identity-based encryption with adaptive security
- Authenticated public key broadcast encryption scheme secure against insiders' attack
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Efficient broadcast encryption with personalized messages
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Generic constructions for fully secure revocable attribute-based encryption
- HIBE: hierarchical identity-based encryption
- Adaptively secure broadcast encryption with dealership
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Public-key revocation and tracing schemes with subset difference methods revisited
- Identity-based trace and revoke schemes
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Revocable hierarchical identity-based encryption via history-free approach
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- Title not available (Why is that?)
- Provably secure (broadcast) homomorphic signcryption
- A Revocation Scheme with Minimal Storage at Receivers
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bonsai trees, or how to delegate a lattice basis
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Information and Communications Security
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Fighting Pirates 2.0
- A note on the security of KHL scheme
- Conjunctive Broadcast and Attribute-Based Encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- Title not available (Why is that?)
- Establishing the broadcast efficiency of the subset difference revocation scheme
- Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings
- Black-box Trace\&Revoke codes
- Decentralized dynamic broadcast encryption
- Fully distributed broadcast encryption
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Security analysis and improvements for the IETF MLS standard for group messaging
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Scalable public-key tracing and revoking
- Anonymous certificate-based broadcast encryption with constant decryption cost
This page was built for publication: Public key broadcast encryption for stateless receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3082983)