-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Shoup, V. (ed.), Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
84978806651
-
Robust encryption
-
Abdalla, M., Bellare, M., Neven, G.: Robust encryption. In: IACR Cryptology ePrint Archive, 2008/440 (2008)
-
(2008)
IACR Cryptology ePrint Archive
, vol.2008
, Issue.440
-
-
Abdalla, M.1
Bellare, M.2
Neven, G.3
-
3
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
Vaudenay, S. (ed.), Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
-
(2005)
PKC 2005. LNCS
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
84978877626
-
Efficient identity-based key encapsulation to multiple parties
-
Barbosa, M., Farshim, P.: Efficient identity-based key encapsulation to multiple parties. In: IACR Cryptology ePrint Archive, 2005/217 (2005)
-
(2005)
IACR Cryptology ePrint Archive
, vol.2005
, pp. 217
-
-
Barbosa, M.1
Farshim, P.2
-
5
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Di Crescenzo, G., Rubin, A. (eds.), Springer, Heidelberg
-
Barth, A., Boneh, D., Waters, B.: Privacy in encrypted content distribution using private broadcast encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52-64. Springer, Heidelberg (2006)
-
(2006)
FC 2006. LNCS
, vol.4107
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
6
-
-
84946837370
-
Key-privacy in public-key encryption
-
Boyd, C. (ed.), Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
-
(2001)
ASIACRYPT 2001. LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
8
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.), Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V. (ed.), Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
10
-
-
85025586099
-
Multi-receiver identity-based key encapsulation with shortened ciphertext
-
Barua, R., Lange, T. (eds.), Springer, Heidelberg
-
Chatterjee, S., Sarkar, P.: Multi-receiver identity-based key encapsulation with shortened ciphertext. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 394-408. Springer, Heidelberg (2006)
-
(2006)
INDOCRYPT 2006. LNCS
, vol.4329
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
11
-
-
84859322276
-
Improved anonymous multi-receiver identity-based encryption
-
Chien, H.-Y.. Improved anonymous multi-receiver identity-based encryption. Comput. J. 55(4), 439-446 (2012)
-
(2012)
Comput. J.
, vol.55
, Issue.4
, pp. 439-446
-
-
Chien, H.-Y.1
-
12
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Kurosawa, K. (ed.), Springer, Heidelberg
-
Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
-
(2007)
ASIACRYPT 2007. LNCS
, vol.4833
, pp. 200-215
-
-
Delerablée, C.1
-
13
-
-
14844304181
-
Public key broadcast encryption for stateless receivers
-
Washington, DC, USA, November 18, 2002
-
Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: Security and Privacy in Digital Rights Management, ACM CCS-9Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, pp. 61-80 (2002)
-
(2002)
Security and Privacy in Digital Rights Management, ACM CCS-9Workshop, DRM 2002
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
14
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Fan, C.-I., Huang, L.-Y., Ho, P.-H.. Anonymous multireceiver identity-based encryption. IEEE Trans. Comput. 59(9), 1239-1249 (2010)
-
(2010)
IEEE Trans. Comput.
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, C.-I.1
Huang, L.-Y.2
Ho, P.-H.3
-
15
-
-
84861665813
-
Outsider-anonymous broadcast encryption with sublinear ciphertexts
-
Darmstadt, May 21-23, 2012
-
Fazio, N., Perera, I.M.: Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Proceedings of the Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, May 21-23, 2012, pp. 225-242 (2012)
-
(2012)
Proceedings of the Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography
, pp. 225-242
-
-
Fazio, N.1
Perera, I.M.2
-
16
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R. (ed.), Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1993. LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
17
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
Joux, A. (ed.), Springer, Heidelberg
-
Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
18
-
-
84979674783
-
Anonymous identitybased broadcast encryption with chosen-ciphertext security
-
January
-
He, K., Weng, J., Liu, J.-N., Liu, J.K., Liu, W., Deng, R.H.: Anonymous identitybased broadcast encryption with chosen-ciphertext security. In: Accepted for publication in ASIACCS 2016, January 2016
-
(2016)
Accepted for publication in ASIACCS 2016
-
-
He, K.1
Weng, J.2
Liu, J.-N.3
Liu, J.K.4
Liu, W.5
Deng, R.H.6
-
19
-
-
78651579171
-
Efficient identity-based broadcast encryption without random oracles
-
Liang, H., Liu, Z., Cheng, X.. Efficient identity-based broadcast encryption without random oracles. JCP 5(3), 331-336 (2010)
-
(2010)
JCP
, vol.5
, Issue.3
, pp. 331-336
-
-
Liang, H.1
Liu, Z.2
Cheng, X.3
-
20
-
-
84861593834
-
Privacy-preserving identity-based broadcast encryption
-
Hur, J., Park, C., Hwang, S.. Privacy-preserving identity-based broadcast encryption. Inf. Fusion 13(4), 296-303 (2012)
-
(2012)
Inf. Fusion
, vol.13
, Issue.4
, pp. 296-303
-
-
Hur, J.1
Park, C.2
Hwang, S.3
-
21
-
-
84878149442
-
An optimal identity-based broadcast encryption scheme for wireless sensor networks
-
Kim, I., Hwang, S.O.: An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans. 96-B(3), 891-895 (2013)
-
(2013)
IEICE Trans.
, vol.96 B
, Issue.3
, pp. 891-895
-
-
Kim, I.1
Hwang, S.O.2
-
22
-
-
84890696263
-
Cryptanalysis of wang et al’.s improved anonymous multi-receiver identity-based encryption scheme
-
Li, H., Pang, L.. Cryptanalysis of wang et al’.s improved anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 8(1), 8-11 (2014)
-
(2014)
IET Inf. Secur.
, vol.8
, Issue.1
, pp. 8-11
-
-
Li, H.1
Pang, L.2
-
23
-
-
84861702751
-
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
-
Darmstadt, May 21-23, 2012
-
Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Proceedings of Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, May 21-23, 2012, pp. 206-224 (2012)
-
(2012)
Proceedings of Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography
, pp. 206-224
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
24
-
-
84904191000
-
Hierarchical identity-based broadcast encryption
-
Susilo, W., Mu, Y. (eds.), Springer, Heidelberg
-
Liu, W., Liu, J.,Wu, Q., Qin, B.: Hierarchical identity-based broadcast encryption. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 242-257. Springer, Heidelberg (2014)
-
(2014)
ACISP 2014. LNCS
, vol.8544
, pp. 242-257
-
-
Liu, W.1
Liu, J.2
Wu, Q.3
Qin, B.4
-
25
-
-
62649173578
-
Fully CCA2 secure identity based broadcast encryption without random oracles
-
Ren, Y., Dawu, G.. Fully CCA2 secure identity based broadcast encryption without random oracles. Inf. Process. Lett. 109(11), 527-533 (2009)
-
(2009)
Inf. Process. Lett.
, vol.109
, Issue.11
, pp. 527-533
-
-
Ren, Y.1
Dawu, G.2
-
26
-
-
84903887855
-
Fully anonymous identity-based broadcast encryption without random oracles
-
Ren, Y., Niu, Z., Zhang, X.. Fully anonymous identity-based broadcast encryption without random oracles. I. J. Netw. Sec. 16(4), 256-264 (2014)
-
(2014)
I. J. Netw. Sec.
, vol.16
, Issue.4
, pp. 256-264
-
-
Ren, Y.1
Niu, Z.2
Zhang, X.3
-
27
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
May 13-17, 1990, Baltimore
-
Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore pp. 387-394 (1990)
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing
, pp. 387-394
-
-
Rompel, J.1
-
29
-
-
84863369937
-
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
-
Wang, H., Yi-Chun Zhang, H., Xiong, H., Qin, B.. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf, Sec. 6(1), 20-27 (2012)
-
(2012)
IET Inf, Sec.
, vol.6
, Issue.1
, pp. 20-27
-
-
Wang, H.1
Yi-Chun Zhang, H.2
Xiong, H.3
Qin, B.4
-
30
-
-
84874743396
-
Lattice-based identity-based broadcast encryption scheme
-
Wang, J., Bi, J.: Lattice-based identity-based broadcast encryption scheme. IACR Cryptology ePrint Archive, 2010/288 (2010)
-
(2010)
IACR Cryptology ePrint Archive
, vol.2010
, pp. 288
-
-
Wang, J.1
Bi, J.2
-
31
-
-
80053542582
-
New identity-based broadcast encryption with constant ciphertexts in the standard model
-
Qing, W., Wang, W.. New identity-based broadcast encryption with constant ciphertexts in the standard model. JSW 6(10), 1929-1936 (2011)
-
(2011)
JSW
, vol.6
, Issue.10
, pp. 1929-1936
-
-
Qing, W.1
Wang, W.2
-
32
-
-
84919657590
-
Efficient anonymous identity-based broadcast encryption without random oracles
-
Xie, L., Ren, Y.. Efficient anonymous identity-based broadcast encryption without random oracles. IJDCF 6(2), 40-51 (2014)
-
(2014)
IJDCF
, vol.6
, Issue.2
, pp. 40-51
-
-
Xie, L.1
Ren, Y.2
-
33
-
-
84904795474
-
Hierarchical identity-based broadcast encryption scheme from LWE
-
Yang, C., Zheng, S., Wang, L., Xiuhua, L., Yang, Y.. Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Netw. 16(3), 258-263 (2014)
-
(2014)
J. Commun. Netw.
, vol.16
, Issue.3
, pp. 258-263
-
-
Yang, C.1
Zheng, S.2
Wang, L.3
Xiuhua, L.4
Yang, Y.5
-
34
-
-
62349086476
-
Identity-based broadcast group-oriented encryption from pairings
-
Hainan Island, China, December 13-15, 2008
-
Zhang, B., Xu, Q.: Identity-based broadcast group-oriented encryption from pairings. In: The Second International Conference on Future Generation Communication and Networking, FGCN 2008, vol. 1, Main Conference, Hainan Island, China, December 13-15, 2008, pp. 407-410 (2008)
-
(2008)
The Second International Conference on Future Generation Communication and Networking, FGCN 2008, vol. 1, Main Conference
, pp. 407-410
-
-
Zhang, B.1
Xu, Q.2
-
35
-
-
84978820797
-
Comment an anonymous multi-receiver identity-based encryption scheme
-
Zhang, J.H., Cui, Y.B.: Comment an anonymous multi-receiver identity-based encryption scheme. IACR Cryptology ePrint Archive, 2012/201 (2012)
-
(2012)
IACR Cryptology ePrint Archive
, vol.2012
, Issue.201
-
-
Zhang, J.H.1
Cui, Y.B.2
-
36
-
-
84922263039
-
An improved anonymous multi-receiver identity-based encryption scheme
-
Zhang, J., Mao, J.. An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4), 645-658 (2015)
-
(2015)
Int. J. Commun. Syst.
, vol.28
, Issue.4
, pp. 645-658
-
-
Zhang, J.1
Mao, J.2
-
37
-
-
58449126665
-
An identity-based broadcast encryption protocol for ad hoc networks
-
Zhang Jia Jie, Hunan, China, November 18-21, 2008
-
Zhang, L., Hu, Y., Mu, N.: An identity-based broadcast encryption protocol for ad hoc networks. In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1619-1623 (2008)
-
(2008)
Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
, pp. 1619-1623
-
-
Zhang, L.1
Hu, Y.2
Mu, N.3
-
38
-
-
84894159504
-
Anonymous identity-based broadcast encryption with adaptive security
-
Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.), Springer, Heidelberg
-
Zhang, L., Wu, Q., Mu, Y.: Anonymous identity-based broadcast encryption with adaptive security. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 258-271. Springer, Heidelberg (2013)
-
(2013)
CSS 2013. LNCS
, vol.8300
, pp. 258-271
-
-
Zhang, L.1
Wu, Q.2
Mu, Y.3
-
39
-
-
84880573517
-
Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation
-
Zhang, M., Takagi, T.. Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation. IEEE Syst. J. 7(3), 410-419 (2013)
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.3
, pp. 410-419
-
-
Zhang, M.1
Takagi, T.2
-
40
-
-
84857361360
-
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
-
Zhao, X., Zhang, F.. Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J. Syst. Softw. 85(3), 708-716 (2012)
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.3
, pp. 708-716
-
-
Zhao, X.1
Zhang, F.2
|