Identity-based broadcast encryption with constant size ciphertexts and private keys

C Delerablée - International Conference on the Theory and …, 2007 - Springer
This paper describes the first identity-based broadcast encryption scheme (IBBE) with
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …

Adaptive security in broadcast encryption systems (with short ciphertexts)

C Gentry, B Waters - Annual International Conference on the Theory and …, 2009 - Springer
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage

H Zhong, W Zhu, Y Xu, J Cui - Soft Computing, 2018 - Springer
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy
attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage …

Removing escrow from identity-based encryption: New security notions and key management techniques

SSM Chow - International workshop on public key cryptography, 2009 - Springer
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …

Anonymous multireceiver identity-based encryption

CI Fan, LY Huang, PH Ho - IEEE Transactions on Computers, 2010 - ieeexplore.ieee.org
Recently, many multireceiver identity-based encryption schemes have been proposed in the
literature. However, none can protect the privacy of message receivers among these …

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices

D He, H Wang, L Wang, J Shen, X Yang - Soft Computing, 2017 - Springer
With the popularity of mobile devices, how to enhance the security and privacy in wireless
communications has gained comprehensive attention. Many cryptographic schemes have …

Generalized key delegation for hierarchical identity-based encryption

M Abdalla, E Kiltz, G Neven - … : 12th European Symposium On Research In …, 2007 - Springer
In this paper, we introduce a new primitive called identitybased encryption with wildcard key
derivation (WKD-IBE, or “wicked IBE”) that enhances the concept of hierarchical identity …

AHMRE-SCST: Lightweight Anonymous Heterogeneous Multi-Recipient Encryption With Seamlessly Compatible System Transformation for IoT Devices

YM Tseng, TC Ho, TT Tsai… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Typically, for the system transformation from an original public-key cryptographic system
(PKCS) setting to another PKCS setting, the relevant cryptographic schemes must be …

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

SKH Islam, MK Khan… - Security and …, 2015 - Wiley Online Library
Recently, numerous multireceiver identity‐based encryption or identity‐based broadcast
encryption schemes have been introduced with bilinear pairing and probabilistic map‐to …

Leakage-resilient anonymous multireceiver certificateless encryption resistant to side-channel attacks

JY Xie, YM Tseng, SS Huang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Anonymous multireceiver encryption (AMRE) allows a data provider to transmit a ciphertext
to a designated group of receivers. Any receiver of the designated group can get the …