Blockchain-based key management scheme in fog-enabled IoT systems

T Chen, L Zhang, KKR Choo, R Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
There are a number of benefits associated with the deployment of fog computing, for
example, by analyzing and computing data from Internet-of-Things (IoT) devices at the fog …

Distributed broadcast encryption from bilinear groups

D Kolonelos, G Malavolta, H Wee - … on the Theory and Application of …, 2023 - Springer
Distributed broadcast encryption (DBE) improves on the traditional notion of broadcast
encryption by eliminating the key-escrow problem: In a DBE system, users generate their …

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

DH Phan, D Pointcheval, SF Shahandashti… - International journal of …, 2013 - Springer
We consider designing public-key broadcast encryption schemes with constant-size secret
keys and ciphertexts, achieving chosen-ciphertext security. We first argue that known CPA-to …

Key management scheme for secure channel establishment in fog computing

L Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
Fog computing is a promising extension of cloud computing, and enables computing directly
at the edge of the network. Due to the decentralized and distributed nature of fog nodes …

Realizing flexible broadcast encryption: How to broadcast to a public-key directory

R Garg, G Lu, B Waters, DJ Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key
encryption, the sender would construct K different ciphertexts, one for each recipient. The …

TreeKEM: asynchronous decentralized key management for large dynamic groups a protocol proposal for messaging layer security (MLS)

K Bhargavan, R Barnes, E Rescorla - 2018 - inria.hal.science
The Messaging Layer Security (MLS) architecture envisions a protocol that can establish a
key shared by a group of members, where each member controls a number of clients …

Distributed Broadcast Encryption from Lattices

J Champion, DJ Wu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
A broadcast encryption scheme allows a user to encrypt a message to $ N $ recipients with
a ciphertext whose size scales sublinearly with $ N $. While broadcast encryption enables …

[图书][B] Advances in Cryptology–ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou …

J Guo, R Steinfeld - 2023 - books.google.com
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th
International Conference on the Theory and Application of Cryptology and Information …

An efficient and secure data sharing method using asymmetric pairing with shorter ciphertext to enable rapid learning in healthcare

S Yadav, N Tiwari - Computational Intelligence and …, 2022 - Wiley Online Library
The recent advent of cloud computing provides a flexible way to effectively share data
among multiple users. Cloud computing and cryptographic primitives are changing the way …

Efficient adaptively secure IBBE from the SXDH assumption

SC Ramanna, P Sarkar - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper describes the first constructions of identity-based broadcast encryption (IBBE)
using Type-3 pairings, which can be proved secure against adaptive-identity attacks based …