Back to Results
First PageMeta Content
Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA


Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1
Add to Reading List

Document Date: 2012-07-23 20:29:45


Open Document

File Size: 479,90 KB

Share Result on Facebook

Company

Fiat / /

Currency

AED / /

Facility

University of Paris / /

Holiday

Assumption / /

IndustryTerm

decapsulation algorithms / prominent applications / generic algorithm / parallel systems / encryption algorithm / Apparent applications / real-time broadcasting / /

Organization

University of Paris / GT / /

Person

Michel Abdalla / Masayuki Abe / Mihir Bellare / Eu-Jin Goh / Dan Boneh / Duong-Hieu Phan / Xavier Boyen / Phillip Rogaway / Serge Fehr / /

Position

extractor / editor / selective CPA / CPA / adaptive CPA / adaptive CPA / and adaptive CCA security / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / Cryptography / identity-based broadcast encryption / symmetric encryption / public key / encryption algorithm / 1.1 Related Work Broadcast encryption / Adaptive CCA Broadcast Encryption / PKI / hybrid encryption / generic algorithm / terms encryption / identity-based encryption / SDH / two identity-based broadcast encryption / private key / secure broadcast encryption / secret key / Pay TV / 2.1 Dynamic Broadcast Encapsulation Broadcast encryption / broadcast encryption / decapsulation algorithms / secure identity-based encryption / four algorithms / Dynamic broadcast encryption / /

SocialTag