Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
From MaRDI portal
Publication:3627434
DOI10.1007/978-3-642-01001-9_10zbMath1239.94073MaRDI QIDQ3627434
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_10
Related Items
Dynamic broadcast encryption scheme with revoking user, Broadcast encryption based non-interactive key distribution in MANETs, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, A note on the security of KHL scheme, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, Identity-based broadcast encryption with continuous leakage resilience, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, Efficient subtree-based encryption for fuzzy-entity data sharing, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Complete tree subset difference broadcast encryption scheme and its analysis, Anonymous certificate-based broadcast encryption with constant decryption cost, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Anonymous trace and revoke, Déjà Q: Encore! Un Petit IBE, How to Avoid Obfuscation Using Witness PRFs, Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, More Efficient Constructions for Inner-Product Encryption, Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness, Secure and Efficient Construction of Broadcast Encryption with Dealership, Adaptively Secure Broadcast Encryption with Dealership, Security Notions for Broadcast Encryption, Fully Distributed Broadcast Encryption, Identity-Based Trace and Revoke Schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Public Key Broadcast Encryption for Stateless Receivers
- Practical Identity-Based Encryption Without Random Oracles
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Tackling Adaptive Corruptions in Multicast Encryption Protocols
- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Cryptography and Coding