Trace and revoke systems with short ciphertexts
Abstract
References
Index Terms
- Trace and revoke systems with short ciphertexts
Recommendations
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
We consider designing public-key broadcast encryption schemes with constant-size secret keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to-CCA transforms currently do not yield such schemes. We then propose a ...
Authenticated public key broadcast encryption with short ciphertexts
AbstractBroadcast encryption allows a broadcaster, who wants to distribute messages to a chosen subset of receivers, to produce an encrypted content and transmit it via a broadcast channel. Normally we think that it is preferable if the broadcast ...
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security
Information Security Practice and ExperienceAbstractWe aim to efficiently design a unified, cost-effective primitive exhibiting two mutually orthogonal functionalities, namely subscribed users anonymity and public-key traitor traceability in the context of Broadcast Encryption (BE), and propose an ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Atilla Elçi,
- Oleg Makarevich,
- Mehmet Orgun,
- Program Chairs:
- Alexander Chefranov,
- Josef Pieprzyk,
- Yuri Anatolievich Bryukhomitsky,
- Sıddıka Berna Örs
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 137Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in