Identity-based broadcast encryption with constant size ciphertexts and private keys
C Delerablée - International Conference on the Theory and …, 2007 - Springer
This paper describes the first identity-based broadcast encryption scheme (IBBE) with
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …
Adaptive security in broadcast encryption systems (with short ciphertexts)
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …
Previous work on fully collusion resistant broadcast encryption systems with very short …
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …
Removing escrow from identity-based encryption: New security notions and key management techniques
SSM Chow - International workshop on public key cryptography, 2009 - Springer
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
Anonymous multireceiver identity-based encryption
CI Fan, LY Huang, PH Ho - IEEE Transactions on Computers, 2010 - ieeexplore.ieee.org
Recently, many multireceiver identity-based encryption schemes have been proposed in the
literature. However, none can protect the privacy of message receivers among these …
literature. However, none can protect the privacy of message receivers among these …
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
With the popularity of mobile devices, how to enhance the security and privacy in wireless
communications has gained comprehensive attention. Many cryptographic schemes have …
communications has gained comprehensive attention. Many cryptographic schemes have …
Generalized key delegation for hierarchical identity-based encryption
In this paper, we introduce a new primitive called identitybased encryption with wildcard key
derivation (WKD-IBE, or “wicked IBE”) that enhances the concept of hierarchical identity …
derivation (WKD-IBE, or “wicked IBE”) that enhances the concept of hierarchical identity …
AHMRE-SCST: Lightweight Anonymous Heterogeneous Multi-Recipient Encryption With Seamlessly Compatible System Transformation for IoT Devices
YM Tseng, TC Ho, TT Tsai… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Typically, for the system transformation from an original public-key cryptographic system
(PKCS) setting to another PKCS setting, the relevant cryptographic schemes must be …
(PKCS) setting to another PKCS setting, the relevant cryptographic schemes must be …
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
Recently, numerous multireceiver identity‐based encryption or identity‐based broadcast
encryption schemes have been introduced with bilinear pairing and probabilistic map‐to …
encryption schemes have been introduced with bilinear pairing and probabilistic map‐to …
Leakage-resilient anonymous multireceiver certificateless encryption resistant to side-channel attacks
JY Xie, YM Tseng, SS Huang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Anonymous multireceiver encryption (AMRE) allows a data provider to transmit a ciphertext
to a designated group of receivers. Any receiver of the designated group can get the …
to a designated group of receivers. Any receiver of the designated group can get the …