메뉴 건너뛰기




Volumn 8616 LNCS, Issue PART 1, 2014, Pages 206-223

Low overhead broadcast encryption from multilinear maps

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84905364497     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44371-2_12     Document Type: Conference Paper
Times cited : (81)

References (26)
  • 2
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 1. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.P.6    Yang, K.7
  • 4
    • 5644266059 scopus 로고    scopus 로고
    • Applications of multilinear forms to cryptography
    • Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemporary Mathematics 324, 71-90 (2003)
    • (2003) Contemporary Mathematics , vol.324 , pp. 71-90
    • Boneh, D.1    Silverberg, A.2
  • 5
    • 84892392741 scopus 로고    scopus 로고
    • Constrained pseudorandom functions and their applications
    • Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. Springer, Heidelberg
    • Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280-300. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8270 , pp. 280-300
    • Boneh, D.1    Waters, B.2
  • 6
    • 84921399997 scopus 로고    scopus 로고
    • Low overhead broadcast encryption from multilinear maps
    • Full version available at the Report 2014/195
    • Boneh, D., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. Full version available at the Cryptology ePrint Archives, Report 2014/195
    • Cryptology ePrint Archives
    • Boneh, D.1    Waters, B.2    Zhandry, M.3
  • 7
    • 84905369063 scopus 로고    scopus 로고
    • Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
    • Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. Springer, Heidelberg
    • Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 480-499. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8616 , pp. 480-499
    • Boneh, D.1    Zhandry, M.2
  • 8
    • 84884473382 scopus 로고    scopus 로고
    • Practical multilinear maps over the integers
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 476-493
    • Coron, J.-S.1    Lepoint, T.2    Tibouchi, M.3
  • 10
    • 35248901924 scopus 로고    scopus 로고
    • Public Key Broadcast Encryption for Stateless Receivers
    • Feigenbaum, J. (ed.) DRM 2002. Springer, Heidelberg
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 11
    • 35248899841 scopus 로고    scopus 로고
    • Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
    • Public Key Cryptography - PKC 2003
    • Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 100-115. Springer, Heidelberg (2002) (Pubitemid 36137131)
    • (2002) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2567 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 12
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
    • Delerablée, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 39-59. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 13
    • 84884490208 scopus 로고    scopus 로고
    • Programmable Hash Functions in the Multilinear Setting
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Freire, E.S.V., Hofheinz, D., Paterson, K.G., Striecks, C.: Programmable Hash Functions in the Multilinear Setting. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 513-530. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 513-530
    • Freire, E.S.V.1    Hofheinz, D.2    Paterson, K.G.3    Striecks, C.4
  • 14
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 15
    • 84861665813 scopus 로고    scopus 로고
    • Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225-242. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 225-242
    • Fazio, N.1    Perera, I.M.2
  • 16
    • 84879875394 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 1-17
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 18
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511-527. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 19
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 20
    • 84937435227 scopus 로고    scopus 로고
    • The lsd broadcast encryption scheme
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Halevy, D., Shamir, A.: The lsd broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 21
    • 84861702751 scopus 로고    scopus 로고
    • Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 206-224. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 206-224
    • Libert, B.1    Paterson, K.G.2    Quaglia, E.A.3
  • 23
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001) (Pubitemid 33317907)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 24
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 25
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS, pp. 458-467 (1997)
    • (1997) FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.