Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
From MaRDI portal
Publication:2900219
DOI10.1007/978-3-642-30057-8_13zbMath1290.94107OpenAlexW2115967491MaRDI QIDQ2900219
Elizabeth A. Quaglia, Benoît Libert, Kenneth G. Paterson
Publication date: 20 July 2012
Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_13
Related Items (28)
Relations between robustness and RKA security under public-key encryption ⋮ Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Group-Based Source-Destination Verifiable Encryption with Blacklist Checking ⋮ Asymptotically tight lower bounds in anonymous broadcast encryption and authentication ⋮ Multi-designated receiver signed public key encryption ⋮ Anonymous, robust post-quantum public key encryption ⋮ Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Post-quantum anonymity of Kyber ⋮ Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Key-oblivious encryption from isogenies with application to accountable tracing signatures ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Arrangements of Pseudocircles: Triangles and Drawings ⋮ Robust encryption ⋮ Robust Encryption, Revisited ⋮ ACE with Compact Ciphertext Size and Decentralized Sanitizers ⋮ Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ Anonymous protocols: notions and equivalence ⋮ Anonymous trace and revoke
Uses Software
This page was built for publication: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model