Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
From MaRDI portal
Publication:5387100
DOI10.1007/978-3-540-76900-2_12zbMath1153.94366OpenAlexW1601035152MaRDI QIDQ5387100
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_12
Related Items (50)
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ A conditional access system with revocation for mobile pay-TV systems revisited ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Secure and Efficient Construction of Broadcast Encryption with Dealership ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost ⋮ Cryptanalysis of an identity based broadcast encryption scheme without random oracles ⋮ Fully anonymous identity-based broadcast signcryption with public verification ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Adaptively Secure Broadcast Encryption with Dealership ⋮ Identity-based broadcast encryption with shorter transmissions ⋮ An efficient key-policy attribute-based encryption scheme with constant ciphertext length ⋮ Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems ⋮ Efficient anonymous multi-group broadcast encryption ⋮ Security Notions for Broadcast Encryption ⋮ A novel authenticated encryption scheme and its extension ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ ACE with Compact Ciphertext Size and Decentralized Sanitizers ⋮ Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Public Key Encryption with Authorized Keyword Search ⋮ Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Identity-Based Trace and Revoke Schemes ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings ⋮ A performance evaluation of pairing-based broadcast encryption systems ⋮ Formal Language Identity-based Cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical ID-Based Cryptography
- Randomness Re-use in Multi-recipient Encryption Schemeas
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Cryptography and Coding
This page was built for publication: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys