Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys

From MaRDI portal
Publication:5429232

DOI10.1007/978-3-540-73489-5_4zbMath1151.94502OpenAlexW1534748576WikidataQ56921595 ScholiaQ56921595MaRDI QIDQ5429232

Pascal Paillier, Cécile Delerablée, David Pointcheval

Publication date: 29 November 2007

Published in: Pairing-Based Cryptography – Pairing 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-73489-5_4




Related Items

Efficient subtree-based encryption for fuzzy-entity data sharingAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSecure and Efficient Construction of Broadcast Encryption with DealershipLocally verifiable signature and key aggregationAttribute-Based Broadcast Encryption Scheme Made EfficientReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costAttribute-based encryption schemes with constant-size ciphertextsCryptanalysis of an identity based broadcast encryption scheme without random oraclesIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsChosen ciphertext secure identity-based broadcast encryption in the standard modelAdaptively Secure Broadcast Encryption with DealershipIdentity-based broadcast encryption with shorter transmissionsIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysA note on the security of KHL schemeFighting Pirates 2.0Security Notions for Broadcast EncryptionFully CCA2 secure identity based broadcast encryption without random oraclesACE with Compact Ciphertext Size and Decentralized SanitizersExpressive attribute-based keyword search with constant-size ciphertextAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Anonymous Identity-Based Broadcast Encryption with Revocation for File SharingOptimal broadcast encryption from pairings and LWEMulti-recipient Public-Key Encryption from Simulators in Security ProofsIdentity-Based Trace and Revoke SchemesDynamic broadcast encryption scheme with revoking userEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionDNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys