Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
From MaRDI portal
Publication:6101280
DOI10.1007/s10623-023-01211-xzbMath1529.94025OpenAlexW4362589839MaRDI QIDQ6101280
Junji Shikata, Kazuhiko Minematsu, Hirokazu Kobayashi, Yohei Watanabe
Publication date: 20 June 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01211-x
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved anonymous broadcast encryptions -- tight security and shorter ciphertext
- Kurosawa-Desmedt meets tight security
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
- Optimal broadcast encryption from pairings and LWE
- Optimal broadcast encryption from LWE and pairings in the standard model
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- On the adaptive security of MACs and PRFs
- Déjà Q: Encore! Un Petit IBE
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Low Overhead Broadcast Encryption from Multilinear Maps
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- The Kernel Matrix Diffie-Hellman Assumption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- The “Coefficients H” Technique
- Adaptive Partitioning
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication