Broadcast encryption

Results: 40



#Item
1

Broadcast Encryption  Moni Naor Amos Fiat Abstract

Add to Reading List

Source URL: pdfs.semanticscholar.org

- Date: 2017-07-07 16:29:07
    2

    Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribusion Systems with Trade-offs between Communication and Storage Yohei Watanabe and Junji Shikata

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    - Date: 2015-11-22 02:25:28
      3

      A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz? and Christoph Striecks?? Karlsruhe Institute of Technology, Karlsruhe, Germany Abstract. At Eurocrypt 2011, Wee presented a generalization

      Add to Reading List

      Source URL: www.kjdf.de

      Language: English - Date: 2014-06-10 05:37:37
        4

        On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis

        Add to Reading List

        Source URL: www.emsec.rub.de

        Language: English - Date: 2010-04-20 22:07:08
          5

          Efficient Broadcast Encryption with User Profiles ★ Murat Ak a,∗ , Kamer Kaya a,1 , Kaan Onarlıo˘glu a , Ali Aydın Sel¸cuk a a

          Add to Reading List

          Source URL: www.onarlioglu.com

          Language: English - Date: 2013-03-05 23:19:40
            6

            ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao∗ Nelly Fazio†

            Add to Reading List

            Source URL: cs.brown.edu

            Language: English - Date: 2004-08-27 22:01:21
              7

              Improving the trade-o between storage and communication in broadcast encryption schemes Ignacio Gracia, Sebasti a Mart n and Carles Padr o

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2001-10-26 11:45:45
                8Tree / Broadcast encryption / Model theory / Cryptography / Set theory / Public-key cryptography

                Graceful Service Degradation (or, How to Know your Payment is Late) ∗ Alexandr Andoni MIT

                Add to Reading List

                Source URL: www.mit.edu

                Language: English - Date: 2005-06-07 15:30:07
                9Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

                Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2012-07-23 20:29:45
                10Deduction / Differential geometry / Symbol / Differential geometry of curves / Entailment / Logic / Abstract algebra / Geometry

                Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, RuiQi Guo Di Ma

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-04-28 05:08:45
                UPDATE