We consider designing public-key broadcast encryption schemes with constant-size secret keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to …
DH Phan, D Pointcheval, M Strefler - International Conference on Security …, 2012 - Springer
A broadcast encryption system generally involves three kinds of entities: the group manager that deals with the membership, the encryptor that encrypts the data to the registered users …
A constrained pseudorandom function F: K * X → Y for a family T ⊆ 2^ X of subsets of\mathcal X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute …
DH Phan, D Pointcheval, VC Trinh - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Broadcast encryption aims at sending a content to a large arbitrary group of users at once. Currently, the most efficient schemes provide constant-size headers, that encapsulate …
S Canard, DH Phan, D Pointcheval, VC Trinh - Theoretical Computer …, 2018 - Elsevier
Abstract Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at sending a content to a large arbitrary group of users at once. Regarding Broadcast …
In this paper, we introduce a new cryptographic primitive called broadcast encryption with dealership. This notion, which has never been discussed in the cryptography literature, is …
This paper proposes a framework that enables secure one‐to‐many communication for networks with limited capabilities in the face of a strong adversary that can capture an …
Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast …
R Dubois, A Guillevic, M Sengelin Le Breton - Pairing-Based Cryptography …, 2013 - Springer
Abstract The Boneh-Gentry-Waters (BGW)[3] broadcast encryption scheme is optimal regarding the overhead size. This performance relies on the use of a pairing. Hence this …