[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Hierarchical identity based encryption with constant size ciphertext

D Boneh, X Boyen, EJ Goh - Annual international conference on the theory …, 2005 - Springer
Abstract We present a Hierarchical Identity Based Encryption (HIBE) system where the
ciphertext consists of just three group elements and decryption requires only two bilinear …

Collusion resistant broadcast encryption with short ciphertexts and private keys

D Boneh, C Gentry, B Waters - Annual international cryptology conference, 2005 - Springer
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …

Privacy-preserving set operations

L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …

Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions

M Abdalla, M Bellare, D Catalano, E Kiltz… - Advances in Cryptology …, 2005 - Springer
We identify and fill some gaps with regard to consistency (the extent to which false positives
are produced) for public-key encryption with keyword search (PEKS). We define …

Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation

D Boneh, M Zhandry - Algorithmica, 2017 - Springer
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …

Identity-based broadcast encryption with constant size ciphertexts and private keys

C Delerablée - International Conference on the Theory and …, 2007 - Springer
This paper describes the first identity-based broadcast encryption scheme (IBBE) with
constant size ciphertexts and private keys. In our scheme, the public key is of size linear in …

Adaptive security in broadcast encryption systems (with short ciphertexts)

C Gentry, B Waters - Annual International Conference on the Theory and …, 2009 - Springer
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …

Revocation systems with very small private keys

A Lewko, A Sahai, B Waters - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
In this work, we design a method for creating public key broadcast encryption systems. Our
main technical innovation is based on a new" two equation" technique for revoking users …

Fully collusion resistant traitor tracing with short ciphertexts and private keys

D Boneh, A Sahai, B Waters - … International Conference on the Theory and …, 2006 - Springer
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts
and constant size private keys. More precisely, let N be the total number of users. Our …