CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
SIAM Journal on Discrete Mathematics
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Long-Lived Broadcast Encryption
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A Quick Group Key Distribution Scheme with "Entity Revocation"
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Efficient Methods for Integrating Traceability and Broadcast Encryption
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Plutus: scalable secure file sharing on untrusted storage
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
A verifiable random function with short proofs and keys
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficient broadcast encryption using multiple interpolation methods
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
New constructions for provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 12th ACM symposium on Access control models and technologies
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java
Computational Intelligence and Security
A Coprocessor for the Final Exponentiation of the ηTPairing in Characteristic Three
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Dynamic Threshold Public-Key Encryption
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Tracing Malicious Proxies in Proxy Re-encryption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
Personalized search using identity-based hashing
Proceedings of the 4th ACM workshop on Digital identity management
Attribute-based on-demand multicast group setup with membership anonymity
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
Fully CCA2 secure identity based broadcast encryption without random oracles
Information Processing Letters
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Implementation of the Pairing on Mobilephones Using BREW
IEICE - Transactions on Information and Systems
Usable secure mailing lists with untrusted servers
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Ternary Subset Difference Method and Its Quantitative Analysis
Information Security Applications
Hierarchical Identity Based Encryption with Polynomially Many Levels
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Defending against the Pirate Evolution Attack
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Dual-Policy Attribute Based Encryption
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Multi-recipient Public-Key Encryption from Simulators in Security Proofs
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Conditional Proxy Broadcast Re-Encryption
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Conjunctive Broadcast and Attribute-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
Trace and revoke systems with short ciphertexts
Proceedings of the 2nd international conference on Security of information and networks
Oblivious transfer with access control
Proceedings of the 16th ACM conference on Computer and communications security
Securing medical records on smart phones
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
FPGA and ASIC implementations of the ηT pairing in characteristic three
Computers and Electrical Engineering
Spatial Encryption under Simpler Assumption
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Broadcast Encryption-Based P2P DRM without Central License Server
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
An efficient broadcast encryption scheme for wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Attribute-based on-demand multicast group setup with membership anonymity
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless broadcast encryption based on smart cards
Wireless Networks
Cryptographic role-based security mechanisms based on role-key hierarchy
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Secure descriptive message dissemination in DTNs
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Some efficient algorithms for the final exponentiation of ηT pairing
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Reduction optimal trinomials for efficient software implementation of the ηT pairing
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Identity trail: covert surveillance using DNS
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
CCA2-secure threshold broadcast encryption with shorter ciphertexts
ProvSec'07 Proceedings of the 1st international conference on Provable security
Implementing DRM over peer-to-peer networks with broadcast encryption
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Universal ηT pairing algorithm over arbitrary extension degree
WISA'07 Proceedings of the 8th international conference on Information security applications
A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Attribute-based broadcast encryption scheme made efficient
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Lower bounds for subset cover based broadcast encryption
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Public key broadcast encryption with low number of keys and constant decryption time
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Defending against the pirate evolution attack
International Journal of Applied Cryptography
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the tenth annual ACM workshop on Digital rights management
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
How to construct interval encryption from binary tree encryption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Securing communication of dynamic groups in dynamic network-centric environments
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
SPORC: group collaboration using untrusted cloud resources
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Efficient broadcast encryption with personalized messages
ProvSec'10 Proceedings of the 4th international conference on Provable security
Threshold public-key encryption with adaptive security and short ciphertexts
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Round-optimal deniable ring authentication in the presence of big brother
WISA'10 Proceedings of the 11th international conference on Information security applications
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
Expressive key-policy attribute-based encryption with constant-size ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Designs, Codes and Cryptography
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Proceedings of the fourth ACM conference on Wireless network security
Enabling security in cloud storage SLAs with CloudProof
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Solving DLP with auxiliary input over an elliptic curve used in TinyTate library
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Security notions for broadcast encryption
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Fully distributed broadcast encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Improved security proofs of Delerablée's identity-based broadcast encryption scheme
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
The n-Diffie-Hellman problem and its applications
ISC'11 Proceedings of the 14th international conference on Information security
Delegable provable data possession for remote data in the clouds
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A generic transformation from symmetric to asymmetric broadcast encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Forward-Secure and searchable broadcast encryption with short ciphertexts and private keys
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Poster: attribute based broadcast encryption with permanent revocation
Proceedings of the 18th ACM conference on Computer and communications security
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Concise mercurial vector commitments and independent zero-knowledge sets with short proofs
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Efficient public key broadcast encryption using identifier of receivers
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
Generic transformation for scalable broadcast encryption schemes
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Constructing verifiable random functions with large input spaces
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Privacy in encrypted content distribution using private broadcast encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Efficient broadcast encryption scheme with log-key storage
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Security analysis of the strong diffie-hellman problem
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Solving a DLP with auxiliary input with the ρ-algorithm
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Short attribute-based signatures for threshold predicates
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Optimal eta pairing on supersingular genus-2 binary hyperelliptic curves
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
G2C: cryptographic protocols from goal-driven specifications
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Towards attribute revocation in key-policy attribute based encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Privacy-preserving identity-based broadcast encryption
Information Fusion
Security and Communication Networks
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Fine-grained user access control in ciphertext-policy attribute-based encryption
Security and Communication Networks
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Outsider-Anonymous broadcast encryption with sublinear ciphertexts
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Efficient provably-secure hierarchical key assignment schemes
MFCS'07 Proceedings of the 32nd international conference on Mathematical Foundations of Computer Science
Generalized key delegation for hierarchical identity-based encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Renewable traitor tracing: a trace-revoke-trace system for anonymous attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Public key encryption with conjunctive keyword search and its extension to a multi-user system
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Direct chosen-ciphertext secure hierarchical ID-based encryption schemes
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
Cryptanalysis of BGW broadcast encryption schemes for DVD content protection
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Secure cooperative access control on grid
Future Generation Computer Systems
Towards secure and communication-efficient broadcast encryption systems
Journal of Network and Computer Applications
Leakage-Resilient spatial encryption
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Time-Specific encryption from forward-secure encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Complete tree subset difference broadcast encryption scheme and its analysis
Designs, Codes and Cryptography
Breaking pairing-based cryptosystems using ηT pairing over GF(397)
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Fully secure hidden vector encryption under standard assumptions
Information Sciences: an International Journal
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
Lower bounds for private broadcast encryption
IH'12 Proceedings of the 14th international conference on Information Hiding
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Improved broadcast encryption scheme with constant-size ciphertext
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Divisible e-cash in the standard model
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Emergency mobile access to personal health records stored on an untrusted cloud
HIS'13 Proceedings of the second international conference on Health Information Science
Ciphertext policy multi-dimensional range encryption
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Multi-channel broadcast encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Efficient and secure data storage operations for mobile cloud computing
Proceedings of the 8th International Conference on Network and Service Management
Privacy in content-oriented networking: threats and countermeasures
ACM SIGCOMM Computer Communication Review
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
International Journal of Security and Networks
Server-aided identity-based anonymous broadcast encryption
International Journal of Security and Networks
A scalable encryption scheme for multi-privileged group communications
The Journal of Supercomputing
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Using SMT solvers to automate design tasks for encryption and signature schemes
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Optimally private access control
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Journal of Computational and Applied Mathematics
Broadcast encryption based non-interactive key distribution in MANETs
Journal of Computer and System Sciences
Anonymous broadcast encryption with an untrusted gateway
International Journal of Security and Networks
The relation and transformation between hierarchical inner product encryption and spatial encryption
Designs, Codes and Cryptography
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public key size in this system is linear in the total number of receivers. Our second system is a generalization of the first that provides a tradeoff between ciphertext size and public key size. For example, we achieve a collusion resistant broadcast system for n users where both ciphertexts and public keys are of size $O(\sqrt{N})$ for any subset of receivers. We discuss several applications of these systems.