Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys - MaRDI portal

Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys

From MaRDI portal
Publication:5387100

DOI10.1007/978-3-540-76900-2_12zbMath1153.94366OpenAlexW1601035152MaRDI QIDQ5387100

Cécile Delerablée

Publication date: 15 May 2008

Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_12




Related Items (50)

Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast DecryptionPublic-Key Puncturable Encryption: Modular and Compact ConstructionsEfficient subtree-based encryption for fuzzy-entity data sharingFine-grained forward secrecy: allow-list/deny-list encryption and applicationsAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceBroadcast encryption based non-interactive key distribution in MANETsA conditional access system with revocation for mobile pay-TV systems revisitedAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionA multivariate identity-based broadcast encryption with applications to the Internet of ThingsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSecure and Efficient Construction of Broadcast Encryption with DealershipKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingForward-secure ID based digital signature scheme with forward-secure private key generatorAnonymous certificate-based broadcast encryption with constant decryption costEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costCryptanalysis of an identity based broadcast encryption scheme without random oraclesFully anonymous identity-based broadcast signcryption with public verificationIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersIncremental symmetric puncturable encryption with support for unbounded number of puncturesA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsAdaptively Secure Broadcast Encryption with DealershipIdentity-based broadcast encryption with shorter transmissionsAn efficient key-policy attribute-based encryption scheme with constant ciphertext lengthEfficient identity-based broadcast encryption with keyword search against insider attacks for database systemsEfficient anonymous multi-group broadcast encryptionSecurity Notions for Broadcast EncryptionA novel authenticated encryption scheme and its extensionMobile access and flexible search over encrypted cloud data in heterogeneous systemsFully CCA2 secure identity based broadcast encryption without random oraclesBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionACE with Compact Ciphertext Size and Decentralized SanitizersAccountable authority identity-based broadcast encryption with constant-size private keys and ciphertextsAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Public Key Encryption with Authorized Keyword SearchGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityAnonymous Identity-Based Broadcast Encryption with Revocation for File SharingOptimal broadcast encryption from pairings and LWEIdentity-Based Trace and Revoke SchemesRevocable identity-based encryption with server-aided ciphertext evolutionNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolIdentity-based broadcast encryption with continuous leakage resilienceEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionA Fuzzy ID-Based Encryption Efficient When Error Rate Is LowNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairingsA performance evaluation of pairing-based broadcast encryption systemsFormal Language Identity-based Cryptography



Cites Work


This page was built for publication: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys