Authenticated public key broadcast encryption scheme secure against insiders' attack
From MaRDI portal
Publication:445379
DOI10.1016/J.MCM.2011.01.056zbMATH Open1245.94085OpenAlexW2045565627WikidataQ121745466 ScholiaQ121745466MaRDI QIDQ445379FDOQ445379
Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon
Publication date: 24 August 2012
Published in: Mathematical and Computer Modelling (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.mcm.2011.01.056
Recommendations
- Authenticated broadcast with a partially compromised public-key infrastructure
- Efficient semi-static secure broadcast encryption scheme
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Authenticated encryption in the face of protocol and side channel leakage
- scientific article; zbMATH DE number 1962140
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Security notions for broadcast encryption
Cites Work
- Public Key Broadcast Encryption for Stateless Receivers
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Title not available (Why is that?)
- Title not available (Why is that?)
- Design of self-healing key distribution schemes
- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
- Relations Among Notions of Plaintext Awareness
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Efficient Broadcast Encryption Using Multiple Interpolation Methods
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Automata, Languages and Programming
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Cited In (1)
This page was built for publication: Authenticated public key broadcast encryption scheme secure against insiders' attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q445379)