Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
From MaRDI portal
Publication:5451030
DOI10.1007/11535218_16zbMath1145.94434OpenAlexW1905774212MaRDI QIDQ5451030
Dan Boneh, Brent Waters, Craig Gentry
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_16
Related Items
A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ Additive-homomorphic functional commitments and applications to homomorphic signatures ⋮ PointProofs, revisited ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ Discrete logarithm problems with auxiliary inputs ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ Secure Hierarchical Identity Based Encryption Scheme in the Standard Model ⋮ Short Attribute-Based Signatures for Threshold Predicates ⋮ Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Generalized closest substring encryption ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Asymptotically tight lower bounds in anonymous broadcast encryption and authentication ⋮ Report and trace ring signatures ⋮ Survey of information security ⋮ Pirate decoder for the broadcast encryption schemes from Crypto 2005 ⋮ A new approach to the discrete logarithm problem with auxiliary inputs ⋮ Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ Multi-designated receiver signed public key encryption ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Verifiable inner product computation on outsourced database for authenticated multi-user data sharing ⋮ A blind coupon mechanism enabling veto voting over unreliable networks ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Secure and Efficient Construction of Broadcast Encryption with Dealership ⋮ CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Automated analysis of cryptographic assumptions in generic group models ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Lower Bounds for Subset Cover Based Broadcast Encryption ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Cryptanalysis of an identity based broadcast encryption scheme without random oracles ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Provably secure role-based encryption with revocation mechanism ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Authenticated public key broadcast encryption scheme secure against insiders' attack ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ An efficient and revocable storage CP-ABE scheme in the cloud computing ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Adaptively Secure Broadcast Encryption with Dealership ⋮ Identity-based broadcast encryption with shorter transmissions ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ Functional broadcast encryption with applications to data sharing for cloud storage ⋮ Efficient anonymous multi-group broadcast encryption ⋮ A note on the security of KHL scheme ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ All-in-one group-oriented cryptosystem based on bilinear pairing ⋮ Fighting Pirates 2.0 ⋮ Security Notions for Broadcast Encryption ⋮ Choosing and generating parameters for pairing implementation on BN curves ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ A novel authenticated encryption scheme and its extension ⋮ New constructions for provably-secure time-bound hierarchical key assignment schemes ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Vector Commitments and Their Applications ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs ⋮ Fully collusion-resistant traitor tracing scheme with shorter ciphertexts ⋮ Updating key size estimations for pairings ⋮ Efficient Broadcast Encryption with Personalized Messages ⋮ Security Analysis of the Strong Diffie-Hellman Problem ⋮ Practical Identity-Based Encryption Without Random Oracles ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ Generalized Identity Based and Broadcast Encryption Schemes ⋮ Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Efficient provably-secure hierarchical key assignment schemes ⋮ Extensions of access structures and their cryptographic applications ⋮ Ternary Subset Difference Method and Its Quantitative Analysis ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Research on attacking a special elliptic curve discrete logarithm problem ⋮ Déjà Q: Encore! Un Petit IBE ⋮ How to Avoid Obfuscation Using Witness PRFs ⋮ Optimal subset-difference broadcast encryption with free riders ⋮ Provably Secure (Broadcast) Homomorphic Signcryption ⋮ ACE with Compact Ciphertext Size and Decentralized Sanitizers ⋮ Defending against the Pirate Evolution Attack ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Public Key Encryption with Authorized Keyword Search ⋮ Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Multi-recipient Public-Key Encryption from Simulators in Security Proofs ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Fully Distributed Broadcast Encryption ⋮ Identity-Based Trace and Revoke Schemes ⋮ Conjunctive Broadcast and Attribute-Based Encryption ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Attribute-Based Encryption for Range Attributes ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes ⋮ Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings ⋮ A performance evaluation of pairing-based broadcast encryption systems ⋮ A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks ⋮ Anonymous trace and revoke ⋮ Generic transformation from broadcast encryption to round-optimal deniable ring authentication
This page was built for publication: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys