Attribute-Based Broadcast Encryption Scheme Made Efficient
From MaRDI portal
Publication:3506391
DOI10.1007/978-3-540-68164-9_22zbMath1142.94351OpenAlexW1957399513MaRDI QIDQ3506391
Publication date: 13 June 2008
Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_22
Related Items (4)
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ A new construction of threshold cryptosystems based on RSA ⋮ Identity-Based Trace and Revoke Schemes
Cites Work
- Complexity of a determinate algorithm for the discrete logarithm
- Public Key Broadcast Encryption for Stateless Receivers
- Identity-Based Encryption Gone Wild
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Attribute-Based Broadcast Encryption Scheme Made Efficient