Generic Transformation for Scalable Broadcast Encryption Schemes (English)
Free access
- New search for: Hwang, Jung Yeon
- New search for: Lee, Dong Hoon
- New search for: Lim, Jongin
- New search for: Hwang, Jung Yeon
- New search for: Lee, Dong Hoon
- New search for: Lim, Jongin
In:
Advances in Cryptology – CRYPTO 2005
;
276-292
;
2005
- Article/Chapter (Book) / Electronic Resource
-
Title:Generic Transformation for Scalable Broadcast Encryption Schemes
-
Contributors:
-
Published in:Advances in Cryptology – CRYPTO 2005 ; 276-292Lecture Notes in Computer Science ; 3621 ; 276-292
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2005-01-01
-
Size:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Efficient Collision Search Attacks on SHA-0Wang, Xiaoyun / Yu, Hongbo / Yin, Yiqun Lisa et al. | 2005
- 17
-
Finding Collisions in the Full SHA-1Wang, Xiaoyun / Yin, Yiqun Lisa / Yu, Hongbo et al. | 2005
- 37
-
Pebbling and Proofs of WorkDwork, Cynthia / Naor, Moni / Wee, Hoeteck et al. | 2005
- 55
-
Composition Does Not Imply Adaptive SecurityPietrzak, Krzysztof et al. | 2005
- 66
-
On the Discrete Logarithm Problem on Algebraic ToriGranger, R. / Vercauteren, F. et al. | 2005
- 86
-
A Practical Attack on a Braid Group Based Cryptographic ProtocolMyasnikov, Alexei / Shpilrain, Vladimir / Ushakov, Alexander et al. | 2005
- 97
-
The Conditional Correlation Attack: A Practical Attack on Bluetooth EncryptionLu, Yi / Meier, Willi / Vaudenay, Serge et al. | 2005
- 118
-
Unconditional Characterizations of Non-interactive Zero-KnowledgePass, Rafael / shelat, abhi et al. | 2005
- 135
-
Impossibility and Feasibility Results for Zero Knowledge with Public KeysAlwen, Joël / Persiano, Giuseppe / Visconti, Ivan et al. | 2005
- 152
-
Communication-Efficient Non-interactive Proofs of Knowledge with Online ExtractorsFischlin, Marc et al. | 2005
- 169
-
A Formal Treatment of Onion RoutingCamenisch, Jan / Lysyanskaya, Anna et al. | 2005
- 188
-
Simple and Efficient Shuffling with Provable Correctness and ZK PrivacyPeng, Kun / Boyd, Colin / Dawson, Ed et al. | 2005
- 205
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsAbdalla, Michel / Bellare, Mihir / Catalano, Dario / Kiltz, Eike / Kohno, Tadayoshi / Lange, Tanja / Malone-Lee, John / Neven, Gregory / Paillier, Pascal / Shi, Haixia et al. | 2005
- 223
-
Private Searching on Streaming DataOstrovsky, Rafail / Skeith, William E. III et al. | 2005
- 241
-
Privacy-Preserving Set OperationsKissner, Lea / Song, Dawn et al. | 2005
- 258
-
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private KeysBoneh, Dan / Gentry, Craig / Waters, Brent et al. | 2005
- 276
-
Generic Transformation for Scalable Broadcast Encryption SchemesHwang, Jung Yeon / Lee, Dong Hoon / Lim, Jongin et al. | 2005
- 293
-
Authenticating Pervasive Devices with Human ProtocolsJuels, Ari / Weis, Stephen A. et al. | 2005
- 309
-
Secure Communications over Insecure Channels Based on Short Authenticated StringsVaudenay, Serge et al. | 2005
- 327
-
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing SchemesCramer, Ronald / Daza, Vanesa / Gracia, Ignacio / Urroz, Jorge Jiménez / Leander, Gregor / Martí-Farré, Jaume / Padró, Carles et al. | 2005
- 344
-
Black-Box Secret Sharing from Primitive Sets in Algebraic Number FieldsCramer, Ronald / Fehr, Serge / Stam, Martijn et al. | 2005
- 361
-
Secure Computation Without AuthenticationBarak, Boaz / Canetti, Ran / Lindell, Yehuda / Pass, Rafael / Rabin, Tal et al. | 2005
- 378
-
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom GeneratorDamgård, Ivan / Ishai, Yuval et al. | 2005
- 395
-
Secure Computation of Constant-Depth Circuits with Applications to Database Search ProblemsBarkol, Omer / Ishai, Yuval et al. | 2005
- 412
-
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical SchemesBoldyreva, Alexandra / Fischlin, Marc et al. | 2005
- 430
-
Merkle-Damgård Revisited: How to Construct a Hash FunctionCoron, Jean-Sébastien / Dodis, Yevgeniy / Malinaud, Cécile / Puniya, Prashant et al. | 2005
- 449
-
On the Generic Insecurity of the Full Domain HashDodis, Yevgeniy / Oliveira, Roberto / Pietrzak, Krzysztof et al. | 2005
- 467
-
New Monotones and Lower Bounds in Unconditional Two-Party ComputationWolf, Stefan / Wullschleger, Jürg et al. | 2005
- 478
-
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key EncryptionHolenstein, Thomas / Renner, Renato et al. | 2005
- 494
-
A Quantum Cipher with Near Optimal Key-RecyclingDamgård, Ivan / Pedersen, Thomas Brochmann / Salvail, Louis et al. | 2005
- 511
-
An Efficient CDH-Based Signature Scheme with a Tight Security ReductionChevallier-Mames, Benoît et al. | 2005
- 527
-
Improved Security Analyses for CBC MACsBellare, Mihir / Pietrzak, Krzysztof / Rogaway, Phillip et al. | 2005
- 546
-
HMQV: A High-Performance Secure Diffie-Hellman ProtocolKrawczyk, Hugo et al. | 2005