메뉴 건너뛰기




Volumn , Issue , 2010, Pages 27-32

An efficient dynamic identity-based broadcast encryption scheme

Author keywords

Bilinear Map; Broadcast encryption; Dynamic identitybased broadcast encryption; ID based cryptology

Indexed keywords

BILINEAR MAP; BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; ID-BASED; IDENTITY-BASED; PRIVATE KEY; PUBLIC KEYS; RANDOM ORACLE MODEL;

EID: 78650382848     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISDPE.2010.10     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 85030481487 scopus 로고    scopus 로고
    • How to broadcast a secret
    • Shimshon Berkovits. How To Broadcast A Secret. EUROCRYPT 1991: 535-541
    • EUROCRYPT 1991 , pp. 535-541
    • Berkovits, S.1
  • 2
    • 84979291225 scopus 로고    scopus 로고
    • Broadcast encryption
    • Amos Fiat, Moni Naor. Broadcast Encryption. CRYPTO 1993: 480-491
    • CRYPTO 1993 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 3
    • 13944258256 scopus 로고    scopus 로고
    • A quick group key distribution scheme with "entity Revocation"
    • Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto.A Quick Group Key Distribution Scheme with "Entity Revocation". ASIACRYPT 1999: 333-347
    • ASIACRYPT 1999 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 5
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Dalit Naor, Moni Naor, Jeff Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. CRYPTO 2001: 41-62
    • CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 6
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • Dani Halevy, Adi Shamir. The LSD Broadcast Encryption Scheme.CRYPTO2002: 47-60
    • CRYPTO 2002 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 7
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Yevgeniy Dodis, Nelly Fazio. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Public Key Cryptography 2003: 100-115
    • (2003) Public Key Cryptography , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 8
    • 0344196671 scopus 로고    scopus 로고
    • Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    • Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai. Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391
    • ASIACRYPT 2003 , pp. 374-391
    • Attrapadung, N.1    Kobara, K.2    Imai, H.3
  • 9
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia. Efficient Tree-Based Revocation in Groups of Low-State Devices. CRYPTO 2004: 511-527
    • CRYPTO 2004 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 10
    • 33646817761 scopus 로고    scopus 로고
    • Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations
    • Nuttapong Attrapadung, Hideki Imai. Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. ASIACRYPT 2005: 100-120
    • ASIACRYPT 2005 , pp. 100-120
    • Attrapadung, N.1    Imai, H.2
  • 11
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Dan Boneh,Craig Gentry, Brent Waters. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
    • CRYPTO 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 12
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • T. Takagi et al., editor, PAIRING 2007. Springer-Verlag, Berlin, Germany
    • Cécile Delerablée, Pascal Paillier, and David Pointcheval. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In T. Takagi et al., editor, PAIRING 2007, volume 4575 of LNCS, pages 39-59. Springer-Verlag, Berlin, Germany, 2007.
    • (2007) LNCS , vol.4575 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 13
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Cécile Delerablée. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In proceeding of ASIACRYPT 2007: 200-215
    • Proceeding of ASIACRYPT 2007 , pp. 200-215
    • Delerablée, C.1
  • 14
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Ronald Cramer, editor, EUROCRYPT 2005, Aarhus, Denmark, May 22-26. Springer-Verlag, Berlin, Germany. Extended version available at
    • Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In Ronald Cramer, editor, EUROCRYPT 2005, volume 3494 of LNCS, pages 440-456, Aarhus, Denmark, May 22-26, 2005. Springer-Verlag, Berlin, Germany. Extended version available at http://eprint.iacr.org/2005/015.
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.