Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
From MaRDI portal
Publication:5429232
DOI10.1007/978-3-540-73489-5_4zbMath1151.94502OpenAlexW1534748576WikidataQ56921595 ScholiaQ56921595MaRDI QIDQ5429232
Pascal Paillier, Cécile Delerablée, David Pointcheval
Publication date: 29 November 2007
Published in: Pairing-Based Cryptography – Pairing 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73489-5_4
Related Items
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Secure and Efficient Construction of Broadcast Encryption with Dealership ⋮ Locally verifiable signature and key aggregation ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Cryptanalysis of an identity based broadcast encryption scheme without random oracles ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Chosen ciphertext secure identity-based broadcast encryption in the standard model ⋮ Adaptively Secure Broadcast Encryption with Dealership ⋮ Identity-based broadcast encryption with shorter transmissions ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ A note on the security of KHL scheme ⋮ Fighting Pirates 2.0 ⋮ Security Notions for Broadcast Encryption ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ ACE with Compact Ciphertext Size and Decentralized Sanitizers ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Multi-recipient Public-Key Encryption from Simulators in Security Proofs ⋮ Identity-Based Trace and Revoke Schemes ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys