scientific article; zbMATH DE number 1842485
From MaRDI portal
Publication:4783719
zbMath1002.94522MaRDI QIDQ4783719
Moni Naor, Jeff Lotspiech, Dalit Naor
Publication date: 8 December 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390041
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Self-updatable encryption with short public parameters and its extensions ⋮ Generic Constructions of Revocable Identity-Based Encryption ⋮ Traceable secret sharing and applications ⋮ Implementing broadcast encryption scheme using bilinear map and group characteristic ⋮ HIBE: Hierarchical Identity-Based Encryption ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Revocable policy-based chameleon hash ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ Asymptotically tight lower bounds in anonymous broadcast encryption and authentication ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Chosen ciphertext secure authenticated group communication using identity-based signcryption ⋮ Black-box Trace\&Revoke codes ⋮ On optimal cryptographic key derivation ⋮ A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Secure and Efficient Construction of Broadcast Encryption with Dealership ⋮ Fully secure revocable attribute-based encryption ⋮ Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework ⋮ A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Lower Bounds for Subset Cover Based Broadcast Encryption ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ A new threshold changeable secret sharing scheme based on the Chinese remainder theorem ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Provably secure role-based encryption with revocation mechanism ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Authenticated public key broadcast encryption scheme secure against insiders' attack ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ Foundations of fully dynamic group signatures ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ Simplified Revocable Hierarchical Identity-Based Encryption from Lattices ⋮ Efficient anonymous multi-group broadcast encryption ⋮ On the mean number of encryptions for tree-based broadcast encryption schemes ⋮ Tree based symmetric key broadcast encryption ⋮ On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ A note on the security of KHL scheme ⋮ Multicast key distribution schemes based on Stinson-Van Trung designs ⋮ Fighting Pirates 2.0 ⋮ Security Notions for Broadcast Encryption ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Lower bounds and new constructions on secure group communication schemes ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Group rekeying in the exclusive subset-cover framework ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Key updating technique in identity-based encryption ⋮ Fully collusion-resistant traitor tracing scheme with shorter ciphertexts ⋮ Efficient Broadcast Encryption with Personalized Messages ⋮ Revocable hierarchical identity-based encryption ⋮ Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Ternary Subset Difference Method and Its Quantitative Analysis ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Optimal subset-difference broadcast encryption with free riders ⋮ Scalable public-key tracing and revoking ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ Defending against the Pirate Evolution Attack ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Establishing the broadcast efficiency of the subset difference revocation scheme ⋮ Revocable attribute-based proxy re-encryption ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Traitors Collaborating in Public: Pirates 2.0 ⋮ Proxy Signature with Revocation ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Foundations of Fully Dynamic Group Signatures ⋮ Identity-Based Trace and Revoke Schemes ⋮ Conjunctive Broadcast and Attribute-Based Encryption ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ Efficient Traitor Tracing from Collusion Secure Codes ⋮ DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance ⋮ Anonymous trace and revoke ⋮ Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing
This page was built for publication: