Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
From MaRDI portal
Publication:3549097
Cited in
(13)- Key encapsulation mechanisms from extractable hash proof systems, revisited
- More efficient DDH pseudorandom generators
- Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
- Security under message-derived keys: signcryption in iMessage
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation
- Multi-recipient and threshold encryption based on hidden multipliers
- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A pseudorandom number generator based on worst-case lattice problems
- TFHE public-key encryption revisited
- Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
- A new multivariate-based certificateless hybrid signcryption scheme for multi-recipient
- Lossy trapdoor functions from homomorphic reproducible encryption
This page was built for publication: Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3549097)