Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model

B Libert, KG Paterson, EA Quaglia - … Conference on Practice and Theory in …, 2012 - Springer
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue
has received very little attention so far and all but one of the currently available BE schemes …

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

DH Phan, D Pointcheval, SF Shahandashti… - International journal of …, 2013 - Springer
We consider designing public-key broadcast encryption schemes with constant-size secret
keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to …

Decentralized dynamic broadcast encryption

DH Phan, D Pointcheval, M Strefler - International Conference on Security …, 2012 - Springer
A broadcast encryption system generally involves three kinds of entities: the group manager
that deals with the membership, the encryptor that encrypts the data to the registered users …

Constrained PRFs for unbounded inputs

H Abusalah, G Fuchsbauer, K Pietrzak - Cryptographers' Track at the RSA …, 2016 - Springer
A constrained pseudorandom function F: K * X → Y for a family T ⊆ 2^ X of subsets
of\mathcal X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute …

Multi-channel broadcast encryption

DH Phan, D Pointcheval, VC Trinh - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Broadcast encryption aims at sending a content to a large arbitrary group of users at once.
Currently, the most efficient schemes provide constant-size headers, that encapsulate …

[HTML][HTML] A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

S Canard, DH Phan, D Pointcheval, VC Trinh - Theoretical Computer …, 2018 - Elsevier
Abstract Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at
sending a content to a large arbitrary group of users at once. Regarding Broadcast …

Broadcast encryption with dealership

C Gritti, W Susilo, T Plantard, K Liang… - International Journal of …, 2016 - Springer
In this paper, we introduce a new cryptographic primitive called broadcast encryption with
dealership. This notion, which has never been discussed in the cryptography literature, is …

Secure broadcast in distributed networks with strong adversaries

P Szalachowski, THJ Kim - Security and Communication …, 2015 - Wiley Online Library
This paper proposes a framework that enables secure one‐to‐many communication for
networks with limited capabilities in the face of a strong adversary that can capture an …

Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption

Q Malluhi, VD Tran, VC Trinh - Symmetry, 2020 - mdpi.com
Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of
legitimate users and to prevent non-legitimate users from recovering the broadcast …

Improved broadcast encryption scheme with constant-size ciphertext

R Dubois, A Guillevic, M Sengelin Le Breton - Pairing-Based Cryptography …, 2013 - Springer
Abstract The Boneh-Gentry-Waters (BGW)[3] broadcast encryption scheme is optimal
regarding the overhead size. This performance relies on the use of a pairing. Hence this …