Pages that link to "Item:Q5429232"
From MaRDI portal
The following pages link to Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys (Q5429232):
Displaying 29 items.
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost (Q1694723) (← links)
- Expressive attribute-based keyword search with constant-size ciphertext (Q1800303) (← links)
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles (Q1944923) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys (Q2335945) (← links)
- Chosen ciphertext secure identity-based broadcast encryption in the standard model (Q2440178) (← links)
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service (Q2666761) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Secure and Efficient Construction of Broadcast Encryption with Dealership (Q2953866) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Attribute-Based Broadcast Encryption Scheme Made Efficient (Q3506391) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs (Q3634501) (← links)
- Dynamic broadcast encryption scheme with revoking user (Q4981096) (← links)
- ACE with Compact Ciphertext Size and Decentralized Sanitizers (Q5205008) (← links)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys (Q5387100) (← links)
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption (Q5502750) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)