-
1
-
-
0001293053
-
Broadcast encryption
-
A. Fiat and M. Naor, "Broadcast encryption," in Proc. CRYPTO, 1993, pp. 480-491.
-
(1993)
Proc. CRYPTO
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, 2005, pp. 258-275.
-
(2005)
Proc. CRYPTO
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
3
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts
-
C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts," in Proc. EUROCRYPT, 2009, pp. 171-188.
-
(2009)
Proc. EUROCRYPT
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
4
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
-
(2007)
Proc. ASIACRYPT
, pp. 200-215
-
-
Delerablée, C.1
-
6
-
-
58349086247
-
Generalized identity based and broadcast encryption schemes
-
D. Boneh, M. Hamburg, "Generalized identity based and broadcast encryption schemes," in Proc. ASIACRYPT, 2008, pp. 455-470.
-
(2008)
Proc. ASIACRYPT
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
7
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
New York, NY, USA
-
C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. STOC, New York, NY, USA, 2008, pp. 197-206.
-
(2008)
Proc. STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
8
-
-
77954625601
-
Efficient lattice (H) IBE in the standard model
-
S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (H) IBE in the standard model," in Proc. EUROCRYPT, 2010, pp. 553-572.
-
(2010)
Proc. EUROCRYPT
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
9
-
-
77957015647
-
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
-
S. Agrawal, D. Boneh, and X. Boyen, "Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE," in Proc. CRYPTO, 2010, pp. 98-115.
-
(2010)
Proc. CRYPTO
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
10
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert "Bonsai trees, or how to delegate a lattice basis," in Proc. EUROCRYPT, 2010, pp. 523-552.
-
(2010)
Proc. EUROCRYPT
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
11
-
-
79955534142
-
Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more
-
X. Boyen, "Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more," in Proc. PKC, 2010, pp. 499-517.
-
(2010)
Proc. PKC
, pp. 499-517
-
-
Boyen, X.1
-
12
-
-
84874743396
-
Lattice-based identity-based broadcast encryption scheme
-
J. Wang and J. Bi, (2010), Lattice-based identity-based broadcast encryption scheme, Cryptology ePrint Archive, Report 2010/288. [Online]. Available: http://eprint.iacr.org.
-
(2010)
Cryptology EPrint Archive, Report 2010/288
-
-
Wang, J.1
Bi, J.2
-
13
-
-
84856523985
-
Hierarchical identity-based broadcast encryption scheme on lattices
-
J. Zhang and Q. Chen, "Hierarchical identity-based broadcast encryption scheme on lattices" in Proc. CIS, 2011, pp. 944-948.
-
(2011)
Proc. CIS
, pp. 944-948
-
-
Zhang, J.1
Chen, Q.2
-
15
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measure
-
D. Micciancio and O. Regev, "Worst-case to average-case reductions based on Gaussian measure," SIAM J. Comput., pp. 267-302, 2007.
-
(2007)
SIAM J. Comput
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
16
-
-
79751533106
-
Generating shorter bases for hard random lattices
-
J. Alwen and C. Peikert, "Generating shorter bases for hard random lattices," Theory Comput. Syst., pp. 535-553, 2011.
-
(2011)
Theory Comput. Syst
, pp. 535-553
-
-
Alwen, J.1
Peikert, C.2
-
17
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
New York, USA
-
O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," in Proc. STOC, New York, USA, 2005, pp. 84-93.
-
(2005)
Proc. STOC
, pp. 84-93
-
-
Regev, O.1
-
18
-
-
84879829096
-
Classical hardness of learning with errors
-
New York, USA
-
Z. Brakerski, A. Langlois, C. Peikert, O. Regev, and D. Stehlé, "Classical hardness of learning with errors," in Proc. STOC, New York, USA, 2013, pp. 575-584.
-
(2013)
Proc. STOC
, pp. 575-584
-
-
Brakerski, Z.1
Langlois, A.2
Peikert, C.3
Regev, O.4
Stehle, D.5
-
20
-
-
38049125096
-
Reducing trust in the PKG in identity based cryptosystems
-
V. Goyal, "Reducing trust in the PKG in identity based cryptosystems," in Proc CRYPTO, 2007, pp. 430-447.
-
(2007)
Proc CRYPTO
, pp. 430-447
-
-
Goyal, V.1
|