Public key broadcast encryption for stateless receivers
From MaRDI portal
Publication:3082983
Recommendations
- scientific article; zbMATH DE number 1942412
- On the mean number of encryptions for tree-based broadcast encryption schemes
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- scientific article; zbMATH DE number 1024079
- A Revocation Scheme with Minimal Storage at Receivers
Cited in
(60)- Anonymous certificate-based broadcast encryption with constant decryption cost
- Scalable public-key tracing and revoking
- Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- An efficient IBE scheme with tight security reduction in the random oracle model
- Complete tree subset difference broadcast encryption scheme and its analysis
- Identity-based broadcast encryption with shorter transmissions
- Information Security and Privacy
- On the mean number of encryptions for tree-based broadcast encryption schemes
- Secure and efficient construction of broadcast encryption with dealership
- Proxy signature with revocation
- A multivariate identity-based broadcast encryption with applications to the Internet of Things
- Authenticated public key broadcast encryption scheme secure against insiders' attack
- Revocable hierarchical identity-based encryption with adaptive security
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Information Security
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Efficient broadcast encryption with personalized messages
- Advances in Cryptology - ASIACRYPT 2003
- Generic constructions for fully secure revocable attribute-based encryption
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- HIBE: hierarchical identity-based encryption
- Adaptively secure broadcast encryption with dealership
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Identity-based trace and revoke schemes
- Revocable hierarchical identity-based encryption via history-free approach
- Public-key revocation and tracing schemes with subset difference methods revisited
- Unique-path identity based encryption with applications to strongly secure messaging
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- scientific article; zbMATH DE number 6683489 (Why is no real title available?)
- Provably secure (broadcast) homomorphic signcryption
- A Revocation Scheme with Minimal Storage at Receivers
- Bonsai trees, or how to delegate a lattice basis
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Information and Communications Security
- A note on the security of KHL scheme
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Fighting Pirates 2.0
- Conjunctive Broadcast and Attribute-Based Encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- Establishing the broadcast efficiency of the subset difference revocation scheme
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings
- Black-box Trace\&Revoke codes
- Decentralized dynamic broadcast encryption
- Fully distributed broadcast encryption
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Security analysis and improvements for the IETF MLS standard for group messaging
This page was built for publication: Public key broadcast encryption for stateless receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3082983)