-
1
-
-
33750089381
-
-
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Cryptology ePrint Archive, Report 2005/254
-
(2005)
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Cryptology ePrint Archive, Report 2005/254
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
24144432124
-
-
Baek J, Safavi-Naini R, Susilo W (2005) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Public key cryptography - PKC 2005, 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp 380–397
-
(2005)
Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Public key cryptography - PKC 2005, 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp 380–397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
84978877626
-
Efficient identity-based key encapsulation to multiple parties
-
Barbosa M, Farshim P (2005) Efficient identity-based key encapsulation to multiple parties. IACR, Cryptology ePrint Archive 2005:217
-
(2005)
IACR, Cryptology ePrint Archive
, vol.2005
, pp. 217
-
-
Barbosa, M.1
Farshim, P.2
-
5
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Barth A, Boneh D, Waters B (2006) Privacy in encrypted content distribution using private broadcast encryption. In: Financial cryptography and data security, 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp 52–64
-
(2006)
Financial cryptography and data security, 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
7
-
-
84946837370
-
-
Bellare M, Boldyreva A, Desai A, Pointcheval D (2001) Key-privacy in public-key encryption. In: Advances in cryptology - ASIACRYPT 2001, 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp 566–582
-
(2001)
Key-privacy in public-key encryption. In: Advances in cryptology - ASIACRYPT 2001, 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp 566–582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
8
-
-
84874324906
-
-
Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Advances in cryptology - CRYPTO 2001, 21st annual international cryptology conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp 213–229
-
(2001)
Identity-based encryption from the weil pairing. In: Advances in cryptology - CRYPTO 2001, 21st annual international cryptology conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp 213–229
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
33745166648
-
-
Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in cryptology - CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp 258–275
-
(2005)
Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in cryptology - CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp 258–275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
10
-
-
35048852705
-
-
Canetti R, Halevi S, Katz J (2004) Chosen-ciphertext security from identity-based encryption. In: Advances in cryptology - EUROCRYPT 2004, international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp 207–222
-
(2004)
Chosen-ciphertext security from identity-based encryption. In: Advances in cryptology - EUROCRYPT 2004, international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp 207–222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
85025586099
-
Multi-receiver identity-based key encapsulation with shortened ciphertext
-
Chatterjee S, Sarkar P (2006) Multi-receiver identity-based key encapsulation with shortened ciphertext. In: Progress in cryptology - INDOCRYPT 2006, 7th international conference on cryptology in india, Kolkata, India, December 11-13, 2006, Proceedings, pp 394–408
-
(2006)
Progress in cryptology - INDOCRYPT 2006, 7th international conference on cryptology in india, Kolkata, India, December 11-13, 2006, Proceedings
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
13
-
-
84859322276
-
Improved anonymous multi-receiver identity-based encryption
-
Chien H (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439–446
-
(2012)
Comput J
, vol.55
, Issue.4
, pp. 439-446
-
-
Chien, H.1
-
14
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Delerablée C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in cryptology - ASIACRYPT 2007, 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp 200–215
-
(2007)
Advances in cryptology - ASIACRYPT
-
-
Delerablée, C.1
-
15
-
-
85030666602
-
-
Dodis Y, Fazio N (2002) Public key broadcast encryption for stateless receivers. In: Security and privacy in digital rights management, ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp 61–80
-
(2002)
Public key broadcast encryption for stateless receivers. In: Security and privacy in digital rights management, ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp 61–80
-
-
Dodis, Y.1
Fazio, N.2
-
16
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Fan C, Huang L, Ho P (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249
-
(2010)
IEEE Trans Comput
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, C.1
Huang, L.2
Ho, P.3
-
17
-
-
84861665813
-
-
Fazio N, Perera IM (2012) Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Public key cryptography - PKC 2012 - 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp 225–242
-
(2012)
Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Public key cryptography - PKC 2012 - 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp 225–242
-
-
Fazio, N.1
Perera, I.M.2
-
20
-
-
84979291225
-
-
Fiat A, Naor M (1993) Broadcast encryption. In: Advances in cryptology - CRYPTO ’93, 13th annual international cryptology conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp 480–491
-
(1993)
Broadcast encryption. In: Advances in cryptology - CRYPTO ’93, 13th annual international cryptology conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp 480–491
-
-
Fiat, A.1
Naor, M.2
-
21
-
-
67650659197
-
-
Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: Advances in cryptology - EUROCRYPT 2009, 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp 171–188
-
(2009)
Adaptive security in broadcast encryption systems (with short ciphertexts). In: Advances in cryptology - EUROCRYPT 2009, 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp 171–188
-
-
Gentry, C.1
Waters, B.2
-
22
-
-
84978900589
-
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
-
a, In
-
He K, Weng J, Au MH, Mao Y, Deng RH (2016a) Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. In: Information security and privacy - 21st australasian conference, ACISP 2016, melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II, pp 207–222
-
(2016)
Information security and privacy - 21st australasian conference, ACISP 2016, melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II
, pp. 207-222
-
-
He, K.1
Weng, J.2
Mh, A.3
Mao, Y.4
Deng, R.H.5
-
23
-
-
84979674783
-
-
He K, Weng J, Liu J, Liu JK, Liu W, Deng RH (2016b) Anonymous identity-based broadcast encryption with chosen-ciphertext security. In: Proceedings of the 11th ACM on asia conference on computer and communications security, asia CCS 2016, xi’an, China, May 30 - June 3, 2016, pp 247–255
-
(2016)
Anonymous identity-based broadcast encryption with chosen-ciphertext security. In: Proceedings of the 11th ACM on asia conference on computer and communications security, asia CCS 2016, xi’an, China, May 30 - June 3, 2016, pp 247–255
-
-
He, K.1
Weng, J.2
Liu, J.3
Liu, J.K.4
Liu, W.5
Deng, R.H.6
-
24
-
-
78651579171
-
Efficient identity-based broadcast encryption without random oracles
-
Hu L, Liu Z, Cheng X (2010) Efficient identity-based broadcast encryption without random oracles. JCP 5(3):331–336
-
(2010)
JCP
, vol.5
, Issue.3
, pp. 331-336
-
-
Hu, L.1
Liu, Z.2
Cheng, X.3
-
25
-
-
84925070600
-
Cost-effective authentic and anonymous data sharing with forward security
-
Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971–983
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.4
, pp. 971-983
-
-
Huang, X.1
Liu, J.K.2
Tang, S.3
Xiang, Y.4
Liang, K.5
Xu, L.6
Zhou, J.7
-
26
-
-
84861593834
-
Privacy-preserving identity-based broadcast encryption
-
Hur J, Park C, Hwang S (2012) Privacy-preserving identity-based broadcast encryption. Information Fusion 13(4):296–303
-
(2012)
Information Fusion
, vol.13
, Issue.4
, pp. 296-303
-
-
Hur, J.1
Park, C.2
Hwang, S.3
-
28
-
-
84878149442
-
An optimal identity-based broadcast encryption scheme for wireless sensor networks
-
Kim I, Hwang SO (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans 96-B(3):891–895
-
(2013)
IEICE Trans
, vol.96-B
, Issue.3
, pp. 891-895
-
-
Kim, I.1
Hwang, S.O.2
-
29
-
-
84890696263
-
Cryptanalysis of wang others.’s improved anonymous multi-receiver identity-based encryption scheme
-
Li H, Pang L (2014) Cryptanalysis of wang others.’s improved anonymous multi-receiver identity-based encryption scheme. IET Inf Secur 8(1):8–11
-
(2014)
IET Inf Secur
, vol.8
, Issue.1
, pp. 8-11
-
-
Li, H.1
Pang, L.2
-
30
-
-
84861702751
-
-
Libert B, Paterson KG, Quaglia EA (2012) Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Public key cryptography - PKC 2012 - 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp 206–224
-
(2012)
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Public key cryptography - PKC 2012 - 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp 206–224
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
31
-
-
84919819096
-
Time-bound anonymous authentication for roaming networks
-
Liu JK, Chu C, Chow SSM, Huang X, Au MH, Zhou J (2015) Time-bound anonymous authentication for roaming networks. IEEE Trans Inf Forensics Secur 10(1):178–189
-
(2015)
IEEE Trans Inf Forensics Secur
, vol.10
, Issue.1
, pp. 178-189
-
-
Liu, J.K.1
Chu, C.2
Chow, S.S.M.3
Huang, X.4
Au, M.H.5
Zhou, J.6
-
32
-
-
84904191000
-
Hierarchical identity-based broadcast encryption
-
Liu W, Liu J, Wu Q, Qin B (2014) Hierarchical identity-based broadcast encryption. In: Information security and privacy - 19th australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp 242–257
-
(2014)
Information security and privacy - 19th australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
, pp. 242-257
-
-
Liu, W.1
Liu, J.2
Wu, Q.3
Qin, B.4
-
34
-
-
62649173578
-
Fully CCA2 secure identity based broadcast encryption without random oracles
-
Ren Y, Gu D (2009) Fully CCA2 secure identity based broadcast encryption without random oracles. Inf Process Lett 109(11):527–533
-
(2009)
Inf Process Lett
, vol.109
, Issue.11
, pp. 527-533
-
-
Ren, Y.1
Gu, D.2
-
35
-
-
84903887855
-
Fully anonymous identity-based broadcast encryption without random oracles
-
Ren Y, Niu Z, Zhang X (2014) Fully anonymous identity-based broadcast encryption without random oracles. I J Network Security 16(4):256–264
-
(2014)
I J Network Security
, vol.16
, Issue.4
, pp. 256-264
-
-
Ren, Y.1
Niu, Z.2
Zhang, X.3
-
36
-
-
0025152622
-
-
Rompel J One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd annual ACM symposium on theory of computing, May 13-17, 1990., Maryland, USA
-
Rompel J (1990) One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22nd annual ACM symposium on theory of computing, May 13-17, 1990. Baltimore, Maryland, USA, pp 387–394
-
(1990)
Baltimore
, pp. 387-394
-
-
-
38
-
-
84863369937
-
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
-
Wang H, Zhang Y, Xiong H, Qin B (2012) Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf Secur 6(1):20–27
-
(2012)
IET Inf Secur
, vol.6
, Issue.1
, pp. 20-27
-
-
Wang, H.1
Zhang, Y.2
Xiong, H.3
Qin, B.4
-
39
-
-
84874743396
-
Lattice-based identity-based broadcast encryption scheme
-
Wang J, Bi J (2010) Lattice-based identity-based broadcast encryption scheme. IACR, Cryptology ePrint Archive 2010:288
-
(2010)
IACR, Cryptology ePrint Archive
, vol.2010
, pp. 288
-
-
Wang, J.1
Bi, J.2
-
40
-
-
80053542582
-
New identity-based broadcast encryption with constant ciphertexts in the standard model
-
Wu Q, Wang W (2011) New identity-based broadcast encryption with constant ciphertexts in the standard model. JSW 6(10):1929–1936
-
(2011)
JSW
, vol.6
, Issue.10
, pp. 1929-1936
-
-
Wu, Q.1
Wang, W.2
-
41
-
-
84919657590
-
Efficient anonymous identity-based broadcast encryption without random oracles
-
Xie L, Ren Y (2014) Efficient anonymous identity-based broadcast encryption without random oracles. IJDCF 6(2):40–51
-
(2014)
IJDCF
, vol.6
, Issue.2
, pp. 40-51
-
-
Xie, L.1
Ren, Y.2
-
42
-
-
84904795474
-
Hierarchical identity-based broadcast encryption scheme from LWE
-
Yang C, Zheng S, Wang L, Lu X, Yang Y (2014) Hierarchical identity-based broadcast encryption scheme from LWE. J Commun Networks 16(3):258–263
-
(2014)
J Commun Networks
, vol.16
, Issue.3
, pp. 258-263
-
-
Yang, C.1
Zheng, S.2
Wang, L.3
Lu, X.4
Yang, Y.5
-
43
-
-
84890885869
-
Towards anonymous ciphertext indistinguishability with identity leakage
-
Yuen TH, Zhang C, Chow SSM, Liu JK (2013) Towards anonymous ciphertext indistinguishability with identity leakage. In: Provable security - 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp 139–153
-
(2013)
Provable security - 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings
, pp. 139-153
-
-
Yuen, T.H.1
Zhang, C.2
Chow, S.S.M.3
Liu, J.K.4
-
44
-
-
84939245573
-
k-times attribute-based anonymous access control for cloud computing
-
Yuen TH, Liu JK, Au MH, Huang X, Susilo W, Zhou J (2015) k-times attribute-based anonymous access control for cloud computing. IEEE Trans Comput 64(9):2595–2608
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.9
, pp. 2595-2608
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Huang, X.4
Susilo, W.5
Zhou, J.6
-
45
-
-
62349086476
-
-
Zhang B, Xu Q (2008) Identity-based broadcast group-oriented encryption from pairings. In: The second international conference on future generation communication and networking, FGCN 2008, volume 1, main conference, hainan island, China, December 13-15, 2008, pp 407–410
-
(2008)
Identity-based broadcast group-oriented encryption from pairings. In: The second international conference on future generation communication and networking, FGCN 2008, volume 1, main conference, hainan island, China, December 13-15, 2008, pp 407–410
-
-
Zhang, B.1
Xu, Q.2
-
46
-
-
84922263039
-
An improved anonymous multi-receiver identity-based encryption scheme
-
Zhang J, Mao J (2015) An improved anonymous multi-receiver identity-based encryption scheme. Int J Commun Syst 28(4):645–658
-
(2015)
Int J Commun Syst
, vol.28
, Issue.4
, pp. 645-658
-
-
Zhang, J.1
Mao, J.2
-
47
-
-
84978820797
-
Comment an anonymous multi-receiver identity-based encryption scheme
-
Zhang JH, Cui YB (2012) Comment an anonymous multi-receiver identity-based encryption scheme. IACR, Cryptology ePrint Archive 2012:201
-
(2012)
IACR, Cryptology ePrint Archive
, vol.2012
, pp. 201
-
-
Zhang, J.H.1
Cui, Y.B.2
-
48
-
-
58449126665
-
-
An identity-based broadcast encryption protocol for ad hoc networks. In: Proceedings of the 9th international conference for young computer scientists, ICYCS 2008, zhang jia jie, hunan, China, November 18-21, 2008, 1619– 1623
-
Zhang L, Hu Y, Mu N (2008) An identity-based broadcast encryption protocol for ad hoc networks. In: Proceedings of the 9th international conference for young computer scientists, ICYCS 2008, zhang jia jie, hunan, China, November 18-21, 2008, pp 1619– 1623
-
(2008)
-
-
Zhang, L.1
Hu, Y.2
Mu, N.3
-
49
-
-
84894159504
-
Anonymous identity-based broadcast encryption with adaptive security
-
Zhang L, Wu Q, Mu Y (2013) Anonymous identity-based broadcast encryption with adaptive security. In: Cyberspace safety and security - 5th international symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pp 258–271
-
(2013)
Cyberspace safety and security - 5th international symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
, pp. 258-271
-
-
Zhang, L.1
Wu, Q.2
Mu, Y.3
-
50
-
-
84880573517
-
Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation
-
Zhang M, Takagi T (2013) Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation. IEEE Syst J 7(3):410–419
-
(2013)
IEEE Syst J
, vol.7
, Issue.3
, pp. 410-419
-
-
Zhang, M.1
Takagi, T.2
-
51
-
-
84857361360
-
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
-
Zhao X, Zhang F (2012) Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708–716
-
(2012)
J Syst Softw
, vol.85
, Issue.3
, pp. 708-716
-
-
Zhao, X.1
Zhang, F.2
|