Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
From MaRDI portal
Publication:5429232
DOI10.1007/978-3-540-73489-5_4zbMATH Open1151.94502DBLPconf/pairing/DelerableePP07OpenAlexW1534748576WikidataQ56921595 ScholiaQ56921595MaRDI QIDQ5429232FDOQ5429232
Authors: Cécile Delerablée, Pascal Paillier, David Pointcheval
Publication date: 29 November 2007
Published in: Pairing-Based Cryptography – Pairing 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73489-5_4
Recommendations
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- Decentralized dynamic broadcast encryption
- scientific article; zbMATH DE number 1302811
Cited In (37)
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
- Distributed encryption fusion estimation against full eavesdropping
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
- DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys
- Identity-based broadcast encryption with shorter transmissions
- Attribute-based encryption schemes with constant-size ciphertexts
- Locally verifiable signature and key aggregation
- Dynamic broadcast encryption scheme with revoking user
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Secure and Efficient Construction of Broadcast Encryption with Dealership
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- Identity-based trace and revoke schemes
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Optimal broadcast encryption from pairings and LWE
- Security notions for broadcast encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Expressive attribute-based keyword search with constant-size ciphertext
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Fighting Pirates 2.0
- A note on the security of KHL scheme
- ACE with Compact Ciphertext Size and Decentralized Sanitizers
- Adaptively Secure Broadcast Encryption with Dealership
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Decentralized dynamic broadcast encryption
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
This page was built for publication: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5429232)