Efficient Identity-based Broadcast Encryption without Random Oracles
暂无分享,去创建一个
[1] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[2] Manuel Barbosa,et al. Efficient Identity-Based Key Encapsulation to Multiple Parties , 2005, IMACC.
[3] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems , 2008, IACR Cryptol. ePrint Arch..
[4] Shanqing Guo,et al. Identity-based Broadcast Encryption Scheme with Untrusted PKG , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[5] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[6] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[7] Sanjit Chatterjee,et al. Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext , 2006, INDOCRYPT.
[8] David Pointcheval,et al. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys , 2007, Pairing.
[9] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[10] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[11] Jun Furukawa,et al. Identity-Based Broadcast Encryption , 2007, IACR Cryptol. ePrint Arch..
[12] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Eike Kiltz,et al. Generalized Key Delegation for Hierarchical Identity-Based Encryption , 2007, ESORICS.
[14] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[15] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.
[16] Ying Wang,et al. An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Nigel P. Smart,et al. Efficient Key Encapsulation to Multiple Parties , 2004, SCN.
[19] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[20] Chen Yang,et al. A New ID-Based Broadcast Encryption Scheme , 2006, ATC.