Augmented Broadcaster Identity-based Broadcast Encryption
暂无分享,去创建一个
[1] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[2] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[3] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems , 2008, IACR Cryptol. ePrint Arch..
[4] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[5] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[6] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[7] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[8] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[9] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[10] David Pointcheval,et al. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.
[11] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.
[12] Benoît Libert,et al. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys , 2008, Public Key Cryptography.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Shanqing Guo,et al. Identity-based Broadcast Encryption Scheme with Untrusted PKG , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[15] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[16] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[17] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[18] Fangguo Zhang,et al. Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority , 2012, J. Syst. Softw..
[19] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[20] Peng Xu,et al. A more efficient accountable authority IBE scheme under the DL assumption , 2010, Science China Information Sciences.
[21] Michael T. Goodrich,et al. Efficient Tree-Based Revocation in Groups of Low-State Devices , 2004, CRYPTO.