scientific article; zbMATH DE number 1842485

From MaRDI portal
Publication:4783719

zbMath1002.94522MaRDI QIDQ4783719

Moni Naor, Jeff Lotspiech, Dalit Naor

Publication date: 8 December 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390041

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

How to use (plain) witness encryption: registered ABE, flexible broadcast, and moreSelf-updatable encryption with short public parameters and its extensionsGeneric Constructions of Revocable Identity-Based EncryptionTraceable secret sharing and applicationsImplementing broadcast encryption scheme using bilinear map and group characteristicHIBE: Hierarchical Identity-Based EncryptionRevocable Decentralized Multi-Authority Functional EncryptionRevocable policy-based chameleon hashServer-aided revocable attribute-based encryption revised: multi-user setting and fully secureAsymptotically tight lower bounds in anonymous broadcast encryption and authenticationConstructions of CCA-Secure Revocable Identity-Based EncryptionGeneric constructions for fully secure revocable attribute-based encryptionEfficient revocable identity-based encryption with short public parametersEfficient revocable identity-based encryption via subset difference methodsRevocable hierarchical identity-based encryption with shorter private keys and update keysChosen ciphertext secure authenticated group communication using identity-based signcryptionBlack-box Trace\&Revoke codesOn optimal cryptographic key derivationA multivariate identity-based broadcast encryption with applications to the Internet of ThingsComplete tree subset difference broadcast encryption scheme and its analysisMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationHardness of \(k\)-LWE and applications in traitor tracingUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessSecure and Efficient Construction of Broadcast Encryption with DealershipFully secure revocable attribute-based encryptionTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationConstructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key FrameworkA Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationAttribute-Based Broadcast Encryption Scheme Made EfficientLower Bounds for Subset Cover Based Broadcast EncryptionFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingAnonymous certificate-based broadcast encryption with constant decryption costGeneric construction of trace-and-revoke inner product functional encryptionIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersA new threshold changeable secret sharing scheme based on the Chinese remainder theoremRevocable hierarchical identity-based encryption via history-free approachCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsProvably secure role-based encryption with revocation mechanismA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAuthenticated public key broadcast encryption scheme secure against insiders' attackNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersFoundations of fully dynamic group signaturesRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysSimplified Revocable Hierarchical Identity-Based Encryption from LatticesEfficient anonymous multi-group broadcast encryptionOn the mean number of encryptions for tree-based broadcast encryption schemesTree based symmetric key broadcast encryptionOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsA note on the security of KHL schemeMulticast key distribution schemes based on Stinson-Van Trung designsFighting Pirates 2.0Security Notions for Broadcast EncryptionSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyLower bounds and new constructions on secure group communication schemesRevocable Identity-Based Encryption Revisited: Security Model and ConstructionGroup rekeying in the exclusive subset-cover frameworkDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationRevocable attribute-based encryption with decryption key exposure resistance and ciphertext delegationBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsKey updating technique in identity-based encryptionFully collusion-resistant traitor tracing scheme with shorter ciphertextsEfficient Broadcast Encryption with Personalized MessagesRevocable hierarchical identity-based encryptionFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionFully CCA2 secure identity based broadcast encryption without random oraclesRevocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsTernary Subset Difference Method and Its Quantitative AnalysisPublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimePractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionOptimal subset-difference broadcast encryption with free ridersScalable public-key tracing and revokingFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsDefending against the Pirate Evolution AttackRevocable hierarchical identity-based encryption with adaptive securityAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityEstablishing the broadcast efficiency of the subset difference revocation schemeRevocable attribute-based proxy re-encryptionAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Traitors Collaborating in Public: Pirates 2.0Proxy Signature with RevocationAnonymous Identity-Based Broadcast Encryption with Revocation for File SharingFoundations of Fully Dynamic Group SignaturesIdentity-Based Trace and Revoke SchemesConjunctive Broadcast and Attribute-Based EncryptionDynamic broadcast encryption scheme with revoking userA PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEMENew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionEfficient Traitor Tracing from Collusion Secure CodesDNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keysAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersA Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc NetworksLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceAnonymous trace and revokeMulti-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing




This page was built for publication: