Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model - MaRDI portal

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

From MaRDI portal
Publication:2900219

DOI10.1007/978-3-642-30057-8_13zbMath1290.94107OpenAlexW2115967491MaRDI QIDQ2900219

Elizabeth A. Quaglia, Benoît Libert, Kenneth G. Paterson

Publication date: 20 July 2012

Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_13




Related Items (28)

Relations between robustness and RKA security under public-key encryptionEfficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast DecryptionEfficient subtree-based encryption for fuzzy-entity data sharingGroup-Based Source-Destination Verifiable Encryption with Blacklist CheckingAsymptotically tight lower bounds in anonymous broadcast encryption and authenticationMulti-designated receiver signed public key encryptionAnonymous, robust post-quantum public key encryptionEfficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA SecurityMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationPost-quantum anonymity of KyberTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationAnonymous certificate-based broadcast encryption with constant decryption costKey-oblivious encryption from isogenies with application to accountable tracing signatures(Augmented) broadcast encryption from identity based encryption with wildcardIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersThe relation and transformation between hierarchical inner product encryption and spatial encryptionArrangements of Pseudocircles: Triangles and DrawingsRobust encryptionRobust Encryption, RevisitedACE with Compact Ciphertext Size and Decentralized SanitizersGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityAnonymous Identity-Based Broadcast Encryption with Revocation for File SharingDynamic broadcast encryption scheme with revoking userSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolIdentity-based broadcast encryption with continuous leakage resilienceAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersAnonymous protocols: notions and equivalenceAnonymous trace and revoke


Uses Software



This page was built for publication: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model