[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Hierarchical identity based encryption with constant size ciphertext
Abstract We present a Hierarchical Identity Based Encryption (HIBE) system where the
ciphertext consists of just three group elements and decryption requires only two bilinear …
ciphertext consists of just three group elements and decryption requires only two bilinear …
Collusion resistant broadcast encryption with short ciphertexts and private keys
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …
systems are fully secure against any number of colluders. In our first construction both …
Privacy-preserving set operations
L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …
private computation over multisets. Each party's input to the function is his private input …
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives
are produced) for public-key encryption with keyword search (PEKS). We define …
are produced) for public-key encryption with keyword search (PEKS). We define …
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
Identity-based broadcast encryption with constant size ciphertexts and private keys
C Delerablée - International Conference on the Theory and …, 2007 - Springer
This paper describes the first identity-based broadcast encryption scheme (IBBE) with
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …
Adaptive security in broadcast encryption systems (with short ciphertexts)
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …
Previous work on fully collusion resistant broadcast encryption systems with very short …
Revocation systems with very small private keys
In this work, we design a method for creating public key broadcast encryption systems. Our
main technical innovation is based on a new" two equation" technique for revoking users …
main technical innovation is based on a new" two equation" technique for revoking users …
Fully collusion resistant traitor tracing with short ciphertexts and private keys
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts
and constant size private keys. More precisely, let N be the total number of users. Our …
and constant size private keys. More precisely, let N be the total number of users. Our …