Pages that link to "Item:Q5387100"
From MaRDI portal
The following pages link to Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys (Q5387100):
Displayed 50 items.
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- An efficient key-policy attribute-based encryption scheme with constant ciphertext length (Q474652) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost (Q1694723) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems (Q1733051) (← links)
- A novel authenticated encryption scheme and its extension (Q1749917) (← links)
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles (Q1944923) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings (Q2096502) (← links)
- A performance evaluation of pairing-based broadcast encryption systems (Q2096602) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Anonymous certificate-based broadcast encryption with constant decryption cost (Q2195299) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Efficient anonymous multi-group broadcast encryption (Q2229276) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts (Q2290624) (← links)
- Revocable identity-based encryption with server-aided ciphertext evolution (Q2310741) (← links)
- A conditional access system with revocation for mobile pay-TV systems revisited (Q2414037) (← links)
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service (Q2666761) (← links)
- Incremental symmetric puncturable encryption with support for unbounded number of punctures (Q2697484) (← links)
- Public Key Encryption with Authorized Keyword Search (Q2817811) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Secure and Efficient Construction of Broadcast Encryption with Dealership (Q2953866) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Formal Language Identity-based Cryptography (Q5025958) (← links)
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption (Q5040409) (← links)
- Public-Key Puncturable Encryption: Modular and Compact Constructions (Q5041162) (← links)
- ACE with Compact Ciphertext Size and Decentralized Sanitizers (Q5205008) (← links)
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption (Q5502750) (← links)
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low (Q5504617) (← links)
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange (Q5918309) (← links)
- A multivariate identity-based broadcast encryption with applications to the Internet of Things (Q6047430) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)
- Fully anonymous identity-based broadcast signcryption with public verification (Q6190008) (← links)