Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
From MaRDI portal
Publication:5429232
Recommendations
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- Decentralized dynamic broadcast encryption
- scientific article; zbMATH DE number 1302811
Cited in
(42)- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Expressive attribute-based keyword search with constant-size ciphertext
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- ACE with compact ciphertext size and decentralized sanitizers
- Secure and efficient construction of broadcast encryption with dealership
- Low overhead broadcast encryption from multilinear maps
- Identity-based broadcast encryption with shorter transmissions
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Efficient semi-static secure broadcast encryption scheme
- A dynamic broadcast encryption scheme with revoking user
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
- Distributed encryption fusion estimation against full eavesdropping
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Optimal broadcast encryption from pairings and LWE
- Provable secure constructions for broadcast encryption with personalized messages
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- Adaptively secure broadcast encryption with dealership
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
- Locally verifiable signature and key aggregation
- Fighting Pirates 2.0
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
- Decentralized dynamic broadcast encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Collusion resistant broadcast and trace from positional witness encryption
- Security notions for broadcast encryption
- A note on the security of KHL scheme
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Identity-based trace and revoke schemes
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
This page was built for publication: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5429232)