Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys - MaRDI portal

Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys

From MaRDI portal
Publication:5451030

DOI10.1007/11535218_16zbMath1145.94434OpenAlexW1905774212MaRDI QIDQ5451030

Dan Boneh, Brent Waters, Craig Gentry

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_16




Related Items

A multivariate identity-based broadcast encryption with applications to the Internet of ThingsBroadcast, trace and revoke with optimal parameters from polynomial hardness(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyConstructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key FrameworkReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting(Augmented) broadcast encryption from identity based encryption with wildcardAdditive-homomorphic functional commitments and applications to homomorphic signaturesPointProofs, revisitedHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsPublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeDiscrete logarithm problems with auxiliary inputsEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionSecure Hierarchical Identity Based Encryption Scheme in the Standard ModelShort Attribute-Based Signatures for Threshold PredicatesOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesEfficient subtree-based encryption for fuzzy-entity data sharingGeneralized closest substring encryptionBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinAsymptotically tight lower bounds in anonymous broadcast encryption and authenticationReport and trace ring signaturesSurvey of information securityPirate decoder for the broadcast encryption schemes from Crypto 2005A new approach to the discrete logarithm problem with auxiliary inputsOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsMulti-designated receiver signed public key encryptionAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceVerifiable inner product computation on outsourced database for authenticated multi-user data sharingA blind coupon mechanism enabling veto voting over unreliable networksBroadcast encryption based non-interactive key distribution in MANETsComplete tree subset difference broadcast encryption scheme and its analysisMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessSecure and Efficient Construction of Broadcast Encryption with DealershipCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsAutomated analysis of cryptographic assumptions in generic group modelsAttribute-Based Broadcast Encryption Scheme Made EfficientLower Bounds for Subset Cover Based Broadcast EncryptionAnonymous certificate-based broadcast encryption with constant decryption costAttribute-based encryption schemes with constant-size ciphertextsCryptanalysis of an identity based broadcast encryption scheme without random oraclesIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersProvably secure role-based encryption with revocation mechanismA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsAuthenticated public key broadcast encryption scheme secure against insiders' attackProvably secure threshold public-key encryption with adaptive security and short ciphertextsAn efficient and revocable storage CP-ABE scheme in the cloud computingThe relation and transformation between hierarchical inner product encryption and spatial encryptionAdaptively Secure Broadcast Encryption with DealershipIdentity-based broadcast encryption with shorter transmissionsIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysFunctional broadcast encryption with applications to data sharing for cloud storageEfficient anonymous multi-group broadcast encryptionA note on the security of KHL schemeCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityAll-in-one group-oriented cryptosystem based on bilinear pairingFighting Pirates 2.0Security Notions for Broadcast EncryptionChoosing and generating parameters for pairing implementation on BN curvesComputational friendly attribute-based encryptions with short ciphertextA novel authenticated encryption scheme and its extensionNew constructions for provably-secure time-bound hierarchical key assignment schemesLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsVector Commitments and Their ApplicationsAttribute-Based Encryption with Fast DecryptionAnalysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputsFully collusion-resistant traitor tracing scheme with shorter ciphertextsUpdating key size estimations for pairingsEfficient Broadcast Encryption with Personalized MessagesSecurity Analysis of the Strong Diffie-Hellman ProblemPractical Identity-Based Encryption Without Random OraclesEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionGeneralized Identity Based and Broadcast Encryption SchemesFaster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-AdditionTracing Malicious Proxies in Proxy Re-encryptionFully CCA2 secure identity based broadcast encryption without random oraclesEfficient provably-secure hierarchical key assignment schemesExtensions of access structures and their cryptographic applicationsTernary Subset Difference Method and Its Quantitative AnalysisCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionResearch on attacking a special elliptic curve discrete logarithm problemDéjà Q: Encore! Un Petit IBEHow to Avoid Obfuscation Using Witness PRFsOptimal subset-difference broadcast encryption with free ridersProvably Secure (Broadcast) Homomorphic SigncryptionACE with Compact Ciphertext Size and Decentralized SanitizersDefending against the Pirate Evolution AttackVerifiable random functions: relations to identity-based key encapsulation and new constructionsAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Public Key Encryption with Authorized Keyword SearchGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityAnonymous Identity-Based Broadcast Encryption with Revocation for File SharingOptimal broadcast encryption from pairings and LWEMulti-recipient Public-Key Encryption from Simulators in Security ProofsConditional Proxy Broadcast Re-EncryptionFully Distributed Broadcast EncryptionIdentity-Based Trace and Revoke SchemesConjunctive Broadcast and Attribute-Based EncryptionNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysAttribute-Based Encryption for Range AttributesDynamic broadcast encryption scheme with revoking userBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolIdentity-based broadcast encryption with continuous leakage resilienceDNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keysNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairingsA performance evaluation of pairing-based broadcast encryption systemsA Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc NetworksAnonymous trace and revokeGeneric transformation from broadcast encryption to round-optimal deniable ring authentication




This page was built for publication: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys