Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
暂无分享,去创建一个
[1] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[2] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[3] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[4] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[5] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[8] Tsutomu Matsumoto,et al. A Quick Group Key Distribution Scheme with "Entity Revocation" , 1999, ASIACRYPT.
[9] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[10] T ShermanAlan,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003 .
[11] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[12] Dan Boneh,et al. Applications of Multilinear Forms to Cryptography , 2002, IACR Cryptol. ePrint Arch..
[13] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[14] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[15] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[16] Michael T. Goodrich,et al. Efficient Tree-Based Revocation in Groups of Low-State Devices , 2004, CRYPTO.
[17] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[18] Ran Canetti,et al. Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.
[19] Jonathan Katz,et al. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption , 2005, CT-RSA.
[20] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[21] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[22] Jung Hee Cheon,et al. Efficient Broadcast Encryption Using Multiple Interpolation Methods , 2004, ICISC.
[23] Wen-Guey Tzeng,et al. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares , 2001, Public Key Cryptography.
[24] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[25] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[26] Antoine Joux,et al. Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups , 2001, IACR Cryptology ePrint Archive.
[27] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[28] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[29] Douglas R. Stinson,et al. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption , 1997, Des. Codes Cryptogr..
[30] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[31] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[32] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[33] Douglas R. Stinson,et al. Some New Results on Key Distribution Patterns and Broadcast Encryption , 1998, Des. Codes Cryptogr..