Fully CCA2 secure identity based broadcast encryption without random oracles
From MaRDI portal
Publication:987813
DOI10.1016/j.ipl.2009.01.017zbMath1211.68187OpenAlexW2027835715WikidataQ121635142 ScholiaQ121635142MaRDI QIDQ987813
Publication date: 16 August 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.01.017
Related Items (7)
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Cryptanalysis of an identity based broadcast encryption scheme without random oracles ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Efficient anonymous multi-group broadcast encryption ⋮ Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Cites Work
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Fully CCA2 secure identity based broadcast encryption without random oracles