Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys

From MaRDI portal
Publication:5429232


DOI10.1007/978-3-540-73489-5_4zbMath1151.94502WikidataQ56921595 ScholiaQ56921595MaRDI QIDQ5429232

Pascal Paillier, Cécile Delerablée, David Pointcheval

Publication date: 29 November 2007

Published in: Pairing-Based Cryptography – Pairing 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-73489-5_4


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Dynamic broadcast encryption scheme with revoking user, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption, Locally verifiable signature and key aggregation, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based encryption schemes with constant-size ciphertexts, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, A note on the security of KHL scheme, Identity-based broadcast encryption with shorter transmissions, Fully CCA2 secure identity based broadcast encryption without random oracles, Efficient subtree-based encryption for fuzzy-entity data sharing, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost, Expressive attribute-based keyword search with constant-size ciphertext, Cryptanalysis of an identity based broadcast encryption scheme without random oracles, Optimal broadcast encryption from pairings and LWE, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys, Chosen ciphertext secure identity-based broadcast encryption in the standard model, Adaptively secure certificate-based broadcast encryption and its application to cloud storage service, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Secure and Efficient Construction of Broadcast Encryption with Dealership, Adaptively Secure Broadcast Encryption with Dealership, Fighting Pirates 2.0, Security Notions for Broadcast Encryption, Identity-Based Trace and Revoke Schemes, Attribute-Based Broadcast Encryption Scheme Made Efficient, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Multi-recipient Public-Key Encryption from Simulators in Security Proofs