-
1
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
Springer Berlin Heidelberg
-
Baek, J., Safavi-Naini, R., & Susilo, W. (2005). Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In Public Key Cryptography-PKC 2005 (pp. 380-397). Springer Berlin Heidelberg. doi:10.1007/978-3-540-30580-4-26
-
(2005)
Public Key Cryptography-PKC 2005
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
2
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Springer Berlin Heidelberg
-
Barth, A., Boneh, D., & Waters, B. (2006). Privacy in encrypted content distribution using private broadcast encryption. In Financial Cryptography and Data Security (pp. 52-64). Springer Berlin Heidelberg. doi:10.1007/11889663-4
-
(2006)
Financial Cryptography and Data Security
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
January. Springer Berlin Heidelberg
-
Boneh, D., Gentry, C., & Waters, B. (2005, January). Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO 2005 (pp. 258-275). Springer Berlin Heidelberg. doi:10.1007/11535218-16
-
(2005)
Advances in Cryptology-CRYPTO 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
Springer Berlin Heidelberg
-
Boyen, X., & Waters, B. (2006). Anonymous hierarchical identity-based encryption (without random oracles). In Advances in Cryptology- CRYPTO 2006 (pp. 290-307). Springer Berlin Heidelberg. doi:10.1007/11818175-17
-
(2006)
Advances in Cryptology- CRYPTO 2006
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
5
-
-
84859322276
-
Improved anonymous multi-receiver identity-based encryption
-
Chien, H. Y. (2012). Improved anonymous multi-receiver identity-based encryption. The Computer Journal, 55(4), 439-446. doi:10.1093/ comjnl/bxr086
-
(2012)
The Computer Journal
, vol.55
, Issue.4
, pp. 439-446
-
-
Chien, H.Y.1
-
6
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Springer Berlin Heidelberg
-
Delerablée, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology-ASIACRYPT 2007 (pp. 200-215). Springer Berlin Heidelberg. doi:10.1007/978-3-540-76900-2-12
-
(2007)
Advances in Cryptology-ASIACRYPT 2007
, pp. 200-215
-
-
Delerablée, C.1
-
7
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
Springer Berlin Heidelberg
-
Delerablée, C., Paillier, P., & Pointcheval, D. (2007). Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-Based Cryptography-Pairing 2007 (pp. 39-59). Springer Berlin Heidelberg. doi:10.1007/978-3-540-73489-5-4
-
(2007)
Pairing-Based Cryptography-Pairing 2007
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
8
-
-
77952048540
-
Anonymity from asymmetry: New constructions for anonymous hibe
-
Springer Berlin Heidelberg
-
Ducas, L. (2010). Anonymity from asymmetry: New constructions for anonymous hibe. In Topics in Cryptology-CT-RSA 2010 (pp. 148-164). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-11925-5-11
-
(2010)
Topics in Cryptology-CT-RSA 2010
, pp. 148-164
-
-
Ducas, L.1
-
9
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Fan, C. I., Huang, L. Y., & Ho, P. H. (2010). Anonymous multireceiver identity-based encryption. Computers. IEEE Transactions on, 59(9), 1239-1249.
-
(2010)
Computers, IEEE Transactions on
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, C.I.1
Huang, L.Y.2
Ho, P.H.3
-
10
-
-
84861665813
-
Outsider-anonymous broadcast encryption with sublinear ciphertexts
-
Springer Berlin Heidelberg
-
Fazio, N., & Perera, I. M. (2012). Outsider-anonymous broadcast encryption with sublinear ciphertexts. In Public Key Cryptography-PKC 2012 (pp. 225-242). Springer Berlin Heidelberg. doi:10.1007/978-3-642-30057-8-14
-
(2012)
Public Key Cryptography-PKC 2012
, pp. 225-242
-
-
Fazio, N.1
Perera, I.M.2
-
11
-
-
84979291225
-
Broadcast encryption
-
January. Springer Berlin Heidelberg
-
Fiat, A., & Naor, M. (1994, January). Broadcast encryption. In Advances in Cryptology - CRYPTO'93 (pp. 480-491). Springer Berlin Heidelberg.
-
(1994)
Advances in Cryptology - CRYPTO'93
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
Springer Berlin Heidelberg
-
Freeman, D. M. (2010). Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In Advances in Cryptology- EUROCRYPT 2010 (pp. 44-61). Springer Berlin Heidelberg. doi:10.1007/978-3-642-13190-5-3
-
(2010)
Advances in Cryptology- EUROCRYPT 2010
, pp. 44-61
-
-
Freeman, D.M.1
-
13
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
Springer Berlin Heidelberg
-
Gentry, C., & Waters, B. (2009). Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology-EUROCRYPT 2009 (pp. 171-188). Springer Berlin Heidelberg. doi:10.1007/978-3-642-01001-9-10
-
(2009)
Advances in Cryptology-EUROCRYPT 2009
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
14
-
-
84861593834
-
Privacy-preserving identity-based broadcast encryption
-
Hur, J., Park, C., & Hwang, S. O. (2012). Privacy-preserving identity-based broadcast encryption. Information Fusion, 13(4), 296-303. doi:10.1016/j.inffus.2011.03.003
-
(2012)
Information Fusion
, vol.13
, Issue.4
, pp. 296-303
-
-
Hur, J.1
Park, C.2
Hwang, S.O.3
-
15
-
-
38049060325
-
Unlinkable secret handshakes and key-private group key management schemes
-
January. Springer Berlin Heidelberg
-
Jarecki, S., & Liu, X. (2007, January). Unlinkable secret handshakes and key-private group key management schemes. In Applied Cryptography and Network Security (pp. 270-287). Springer Berlin Heidelberg. doi:10.1007/978-3-540-72738-5-18
-
(2007)
Applied Cryptography and Network Security
, pp. 270-287
-
-
Jarecki, S.1
Liu, X.2
-
16
-
-
84898467054
-
Key management scheme using dynamic identity-based broadcast encryption for social network services
-
Springer Berlin Heidelberg
-
Jung, Y., Nam, Y., Kim, J., Jeon, W., Lee, H., & Won, D. (2014). Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services. In Advanced in Computer Science and its Applications (pp. 435-443). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-41674-3-62
-
(2014)
Advanced in Computer Science and Its Applications
, pp. 435-443
-
-
Jung, Y.1
Nam, Y.2
Kim, J.3
Jeon, W.4
Lee, H.5
Won, D.6
-
17
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Springer Berlin Heidelberg
-
Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology-EUROCRYPT 2008 (pp. 146-162). Springer Berlin Heidelberg. doi:10.1007/978-3- 540-78967-3-9
-
(2008)
Advances in Cryptology-EUROCRYPT 2008
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
18
-
-
85025119679
-
Efficient ciphertext-policy attribute based encryption with hidden policy
-
Springer Berlin Heidelberg
-
Li, X., Gu, D., Ren, Y., Ding, N., & Yuan, K. (2012). Efficient ciphertext-policy attribute based encryption with hidden policy. In Internet and Distributed Computing Systems (pp. 146-159). Springer Berlin Heidelberg. doi:10.1007/978-3- 642-34883-9-12
-
(2012)
Internet and Distributed Computing Systems
, pp. 146-159
-
-
Li, X.1
Gu, D.2
Ren, Y.3
Ding, N.4
Yuan, K.5
-
19
-
-
84861702751
-
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
-
Springer Berlin Heidelberg
-
Libert, B., Paterson, K. G., & Quaglia, E. A. (2012). Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In Public Key Cryptography-PKC 2012 (pp. 206-224). Springer Berlin Heidelberg. doi:10.1007/978-3-642-30057-8-13
-
(2012)
Public Key Cryptography-PKC 2012
, pp. 206-224
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
20
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. Vehicular Technology. IEEE Transactions on, 56(6), 3442-3456.
-
(2007)
Vehicular Technology, IEEE Transactions on
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.H.3
Shen, X.4
-
21
-
-
84858234376
-
Adaptively secure broadcast encryption with short ciphertexts
-
Malek, B., & Miri, A. (2012). Adaptively Secure Broadcast Encryption with Short Ciphertexts. International Journal of Network Security, 14(2), 71-79.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.2
, pp. 71-79
-
-
Malek, B.1
Miri, A.2
-
22
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
January. Springer Berlin Heidelberg
-
Naor, D., Naor, M., & Lotspiech, J. (2001, January). Revocation and tracing schemes for stateless receivers. In Advances in Cryptology - CRYPTO 2001 (pp. 41-62). Springer Berlin Heidelberg. doi:10.1007/3-540-44647-8-3
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
23
-
-
84903887855
-
Fully anonymous identity-based broadcast encryption without random oracles
-
Ren, Y., Niu, Z., & Zhang, X. (2014). Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. International Journal of Network Security, 16(3), 247-255.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.3
, pp. 247-255
-
-
Ren, Y.1
Niu, Z.2
Zhang, X.3
-
24
-
-
84868328593
-
Non-interactive dynamic identity-based broadcast encryption without random oracles
-
Springer Berlin Heidelberg
-
Ren, Y., Wang, S., & Zhang, X. (2012). Non-interactive dynamic identity-based broadcast encryption without random oracles. In Information and Communications Security (pp. 479-487). Springer Berlin Heidelberg. doi:10.1007/978-3-642-34129-8-47
-
(2012)
Information and Communications Security
, pp. 479-487
-
-
Ren, Y.1
Wang, S.2
Zhang, X.3
-
25
-
-
84860742297
-
CCA-secure anonymous multi-receiver id-based encryption
-
March. IEEE
-
Tseng, Y. M., Huang, Y. H., & Chang, H. J. (2012, March). CCA-secure Anonymous Multi-receiver ID-based Encryption. In Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on (pp. 177-182). IEEE.
-
(2012)
Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on
, pp. 177-182
-
-
Tseng, Y.M.1
Huang, Y.H.2
Chang, H.J.3
-
26
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer Berlin Heidelberg
-
Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2005 (pp. 114-127). Springer Berlin Heidelberg. doi:10.1007/11426639-7
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, pp. 114-127
-
-
Waters, B.1
-
27
-
-
84865498573
-
Secure identity-based encryption in the quantum random oracle model
-
Springer Berlin Heidelberg
-
Zhandry, M. (2012). Secure identity-based encryption in the quantum random oracle model. In Advances in Cryptology-CRYPTO 2012 (pp. 758-775). Springer Berlin Heidelberg. doi:10.1007/978-3-642-32009-5-44
-
(2012)
Advances in Cryptology-CRYPTO 2012
, pp. 758-775
-
-
Zhandry, M.1
-
28
-
-
84894159504
-
Anonymous identity-based broadcast encryption with adaptive security
-
Springer International Publishing
-
Zhang, L., Wu, Q., & Mu, Y. (2013). Anonymous Identity-Based Broadcast Encryption with Adaptive Security. In Cyberspace Safety and Security (pp. 258-271). Springer International Publishing. doi:10.1007/978-3-319-03584-0-19
-
(2013)
Cyberspace Safety and Security
, pp. 258-271
-
-
Zhang, L.1
Wu, Q.2
Mu, Y.3
-
29
-
-
84865566085
-
Amendment to trace and revoke systems with short ciphertexts
-
Zhao, X. (2012). Amendment to Trace and Revoke Systems with Short Ciphertexts. International Journal of Network Security, 14(5), 251-256.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.5
, pp. 251-256
-
-
Zhao, X.1
|