ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
25
views
23
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,187
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - EUROCRYPT 2009
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
other
Author(s):
Craig Gentry
,
Brent Waters
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Most cited references
23
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
327
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh
,
Xavier Boyen
,
Eu-Jin Goh
(2005)
0
comments
Cited
106
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Ronald Cramer
,
Victor Shoup
(2002)
0
comments
Cited
101
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 171-188
DOI:
10.1007/978-3-642-01001-9_10
SO-VID:
e38f8ff3-3dab-4827-bc74-3830238c0065
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
pp. 36
Breaking RSA Generically Is Equivalent to Factoring
pp. 171
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
pp. 206
Key Agreement from Close Secrets over Unsecured Channels
pp. 278
Cube Attacks on Tweakable Black Box Polynomials
pp. 313
Practical Chosen Ciphertext Secure Encryption from Factoring
pp. 351
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
pp. 371
Salvaging Merkle-Damgård for Practical Applications
pp. 407
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
pp. 425
On the Portability of Generalized Schnorr Proofs
pp. 443
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
pp. 462
A Leakage-Resilient Mode of Operation
pp. 518
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
pp. 572
Optimal Randomness Extraction from a Diffie-Hellman Element
pp. 590
A New Randomness Extraction Paradigm for Hybrid Encryption
Similar content
4,187
Implementing secure data access control for multi-authority cloud storage system using Ciphertext Policy-Attribute based encryption
Authors:
S. Vijaya Lekshmi
,
M. R. Revathi
Reliable Multicast and Broadcast Mechanisms for Energy-Harvesting Devices
Authors:
Ching-Chun Kuan
,
Guan-Yu Lin
,
Hung-Yu Wei
…
Multicast and broadcast services over mobile networks: a survey on standardized approaches and scientific outcomes
Authors:
Domenico Striccoli
,
Giuseppe Piro
,
Gennaro Boggia
See all similar
Cited by
16
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
Authors:
Nuttapong Attrapadung
,
Hideki Imai
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Authors:
Dan Boneh
,
Mark Zhandry
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Authors:
Benoit Libert
,
Kenneth G. Paterson
,
Elizabeth Quaglia
See all cited by