×

Found 63 Documents (Results 1–63)

Constructions of secure multi-channel broadcast encryption schemes in public key framework. (English) Zbl 1518.94036

Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 495-515 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recipient revocable broadcast encryption with dealership. (English) Zbl 1507.94041

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 214-228 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recipient revocable broadcast encryption schemes without random oracles. (English) Zbl 1507.94025

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 191-213 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Subtleties in security definitions for predicate encryption with public index. (English) Zbl 1501.94029

Blömer, Johannes (ed.) et al., Mathematical aspects of computer and information sciences. 7th international conference, MACIS 2017, Vienna, Austria, November 15–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10693, 438-453 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable secure constructions for broadcast encryption with personalized messages. (English) Zbl 1439.94018

Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 329-348 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure broadcast encryption with dealership. (English) Zbl 1381.94059

Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 161-177 (2017).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a privacy preserving auditing for data integrity protocol from TrustCom 2013. (English) Zbl 1403.94044

Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 37-47 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure and efficient construction of broadcast encryption with dealership. (English) Zbl 1381.94058

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 277-295 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Many weak keys for PRINTcipher: fast key recovery and countermeasures. (English) Zbl 1301.94110

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
MSC:  94A60 90C11 90C05
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of randomized arithmetic codes based on Markov model. (English) Zbl 1292.94164

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 341-362 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Deniable encryptions secure against adaptive chosen ciphertext attack. (English) Zbl 1291.94087

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 46-62 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of identity based ring signcryption schemes. (English) Zbl 1307.94121

Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 310-325 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software