Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
From MaRDI portal
Publication:3627434
DOI10.1007/978-3-642-01001-9_10zbMath1239.94073OpenAlexW1806049065MaRDI QIDQ3627434
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_10
Related Items (41)
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Asymptotically tight lower bounds in anonymous broadcast encryption and authentication ⋮ Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Secure and Efficient Construction of Broadcast Encryption with Dealership ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Adaptively Secure Broadcast Encryption with Dealership ⋮ Functional broadcast encryption with applications to data sharing for cloud storage ⋮ Efficient anonymous multi-group broadcast encryption ⋮ A note on the security of KHL scheme ⋮ Security Notions for Broadcast Encryption ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Déjà Q: Encore! Un Petit IBE ⋮ How to Avoid Obfuscation Using Witness PRFs ⋮ Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Optimal broadcast encryption from pairings and LWE ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Fully Distributed Broadcast Encryption ⋮ Identity-Based Trace and Revoke Schemes ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ A performance evaluation of pairing-based broadcast encryption systems ⋮ Anonymous trace and revoke
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Public Key Broadcast Encryption for Stateless Receivers
- Practical Identity-Based Encryption Without Random Oracles
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Tackling Adaptive Corruptions in Multicast Encryption Protocols
- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Cryptography and Coding
This page was built for publication: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)