• No results found

Broadcast Encryption

An Efficient Identity Based Homomorphic Broadcast Encryption

An Efficient Identity Based Homomorphic Broadcast Encryption

... Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ...in broadcast encryption scheme, ciphertext length is always related to the size ...

8

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

... A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS| = n, of a given set of users, such that only users in this subset can decrypt the ...

5

Improved Identity based Anonymous Broadcast Encryption with Chosen Ciphertext Security

Improved Identity based Anonymous Broadcast Encryption with Chosen Ciphertext Security

... other. Broadcast encryption (BE) as an idea was first propounded by Fiat and Naor in 1994, and it is a mode of communication where encryption of public-keys is sent to many recipients ...

8

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

... the encryption scheme for transmitting the user’s information and linked nodes that determined parts for each ...for encryption in decentralized ...in encryption message in decentralized ...

5

Complete tree subset difference broadcast encryption scheme and its analysis

Complete tree subset difference broadcast encryption scheme and its analysis

... Broadcast Encryption was introduced in [Ber91] followed by [FN93]. There have been several works in this area [Sti97, SW98] since then, but the most popular scheme out of these is the tree-based Subset ...

27

A  generic  view  on  trace-and-revoke  broadcast  encryption  schemes

A generic view on trace-and-revoke broadcast encryption schemes

... Broadcast encryption, revocation schemes, traitor tracing, and trace-and-revoke ...a broadcast encryption (BE) scheme [29], a sender is able to generate ciphertexts that only members of a ...

18

Improved  Broadcast  Encryption  Scheme  with  Constant-Size  Ciphertext

Improved Broadcast Encryption Scheme with Constant-Size Ciphertext

... A broadcast encryption scheme is a protocol allowing a broadcaster to send messages to a large set U of users or receivers, n = #U ...A broadcast protocol is secure under (t, n)-collusion if for all ...

14

Tight  Adaptively  Secure  Broadcast  Encryption  with  Short  Ciphertexts   and  Keys

Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys

... Broadcast encryption schemes [FN94] allow a sender to encrypt messages to a set Γ ⊂ [n] of authorized users such that any user in the set Γ can decrypt, and no (possibly colluding) set of unauthorized users ...

32

Adaptive  CCA  Broadcast  Encryption  with  Constant-Size  Secret  Keys   and  Ciphertexts

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts

... designing broadcast encryption schemes with constant-size secret keys and ciphertexts, achieving chosen-ciphertext ...both broadcast encryption and revocation schemes simultaneously using the ...

20

A Unique Contributory Broadcast Encryption with Efficient Encryption and Short Cipher Texts 
Bala Swathi, P Pravalika & T Madhu

A Unique Contributory Broadcast Encryption with Efficient Encryption and Short Cipher Texts Bala Swathi, P Pravalika & T Madhu

... dealer. Broadcast encryption (BE) is a well-studied primitive intended for secure group- oriented ...securely broadcast to any subset of the group ...

6

Ciphertext-Policy  Attribute-Based  Broadcast  Encryption  with  Small  Keys

Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys

... The key difference between an attributed-based broadcast encryption (ABBE) scheme and an ABE one is the additional possibility to revoke individual receivers in an efficient way. Given an ABE scheme, it is ...

15

Identity-Set-based  Broadcast  Encryption  supporting Cut-or-Select  with  Short  Ciphertext

Identity-Set-based Broadcast Encryption supporting Cut-or-Select with Short Ciphertext

... public-key encryption, the first public-key BE scheme was proposed by Dois et ...identity-based broadcast en- cryption and gave a selective CPA secure ...Existing broadcast encryption can be ...

12

Tree based symmetric key broadcast encryption

Tree based symmetric key broadcast encryption

... Broadcast Encryption for stateless receivers was first considered explicitly by Naor, Naor and Lotspiech in [NNL01, NNL02]. They defined a generic framework, called Subset-Cover framework, encapsulating ...

40

Outsider-Anonymous  Broadcast  Encryption  with  Sublinear  Ciphertexts

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts

... receiver-anonymous broadcast encryption has recently been started by Jarecki and Liu ...public-key broadcast encryption scheme, with the additional property of protecting the receivers’ ...

27

Analysis   and  Trade-Offs  for  the (Complete  Tree)  Layered  Subset  Difference  Broadcast  Encryption  Scheme

Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme

... Broadcast Encryption (BE) is an important technique for digital rights management (DRM). Two key parameters of a BE scheme are the average size of the transmission overhead and the size of the secret ...

21

Tree  Based  Symmetric  Key  Broadcast  Encryption

Tree Based Symmetric Key Broadcast Encryption

... for broadcast encryption was proposed in ...key broadcast encryption scheme falls under this ...initiation, encryption and ...The broadcast messages are sent to the users in ...

37

Multi-Channel  Broadcast  Encryption

Multi-Channel Broadcast Encryption

... Multi-Channel Broadcast Encryption – MIBE: one can hope for a much shorter global overhead and a short zapping time since the decoder already has the information to decrypt any available channel at ...

14

BESTIE:  Broadcast  Encryption  Scheme  for  Tiny  IoT  Equipments

BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments

... The subset cover representation method of our system is based on the combi- natorial subset difference (CSD) proposed in [KLLO17]. The CSD uses a more general, thus, more compact representation method which is extended ...

30

An  Attribute-Based  Anonymous  Broadcast  Encryption  Scheme  with  Adaptive  Security  in  the  Standard  Model

An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model

... attribute-based broadcast encryption (ABBE), a broadcaster can encrypt a massage under a specified attribute policy, and only the receivers who own the intended attributes can decrypt the ...

17

Contributory Broadcast Encryption on Group key Agreement For key Distribution Encryption & Decryption

Contributory Broadcast Encryption on Group key Agreement For key Distribution Encryption & Decryption

... Abstract: Encryption is utilized in a communication system to secure information in the transmitted messages from anyone other than ye well aimed ...the encryption plus decryption ye transmitter and ...

6

Show all 4447 documents...

Related subjects