Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
From MaRDI portal
Publication:2817815
DOI10.1007/978-3-319-40367-0_14zbMath1346.94108OpenAlexW2476517073MaRDI QIDQ2817815
Jianchang Lai, Fuchun Guo, Rongmao Chen, Willy Susilo, Yi Mu
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/eispapers/5936
Related Items
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption ⋮ Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Arrangements of Pseudocircles: Triangles and Drawings
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Low Overhead Broadcast Encryption from Multilinear Maps
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Public Key Broadcast Encryption for Stateless Receivers
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Conditional Proxy Broadcast Re-Encryption
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Anonymous Multireceiver Identity-Based Encryption
- Advances in Cryptology – CRYPTO 2004
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Broadcast Steganography
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys