Group-oriented encryption for dynamic groups with constant rekeying cost
暂无分享,去创建一个
[1] Jun Ao,et al. Group-oriented Encryption Secure against Collude Attack , 2008, J. Convergence Inf. Technol..
[2] Ali Miri,et al. Adaptively Secure Broadcast Encryption with Short Ciphertexts , 2010, Int. J. Netw. Secur..
[3] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[4] Jun Ao,et al. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack , 2009, Int. J. Netw. Secur..
[5] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] David Pointcheval,et al. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.
[8] Bo Zhang,et al. Identity-Based Broadcast Group-Oriented Encryption from Pairings , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[9] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.
[10] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[11] Alfred Menezes,et al. A Survey of Public-Key Cryptosystems , 2004, SIAM Rev..
[12] Tzonelih Hwang,et al. New generalized group-oriented cryptosystem based on Diffie-Hellman scheme , 1999, Comput. Commun..
[13] Qin Liu,et al. A Scalable Encryption Scheme for Multi-Privileged Group Communications , 2010, EUC.
[14] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[15] Xu An Wang,et al. Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[17] Qiuliang Xu,et al. An identity-based group-oriented threshold encryption scheme , 2011, 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification.
[18] David Pointcheval,et al. Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts , 2012, ACISP.
[19] Ting Yi Chang. An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks , 2009, Comput. Commun..
[20] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[21] Yang Yang. Broadcast encryption based non-interactive key distribution in MANETs , 2014, J. Comput. Syst. Sci..
[22] Jun Ao,et al. Improved Group-Oriented Encryption for Group Communication , 2009, 2009 International Joint Conference on Computational Sciences and Optimization.
[23] Tzong-Chen Wu,et al. ID-based group-oriented cryptosystem and its digital signature scheme , 1997, Comput. Commun..
[24] Guozhen Xiao,et al. General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security , 2008, Int. J. Netw. Secur..
[25] Jianhua Li,et al. Broadcast Group-oriented Encryption in Group Communication , 2006, 2006 International Conference on Communications, Circuits and Systems.
[26] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[27] Li Jianhua,et al. Broadcast group-oriented encryption secure against chosen ciphertext attack , 2007 .