mzhandry.stanford.edu We build the first public-key broadcast encryption system that simultaneously achieves adaptive security against arbitrary number of colluders, has small system parameters, and has a security proof based on non-interactive falsifiable assumptions. Our scheme is built from composite order multilinear maps and enjoys a ciphertext overhead, private key size, and public key size that are are all poly-logarithmic in the total number of users. Previous broadcast schemes with similar parameters are either proven secure in a weaker static model, or rely on powerful tools such as program obfuscation and involve non-falsifiable assumptions.
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Suppose a user wants to broadcast an encrypted message to $K$ recipients. With public-key encryption...
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast e...
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast e...
We describe two new public key broadcast encryption systems for stateless receivers. Both systems ar...
In this paper, we present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
Abstract. In this paper, we propose a semi-static secure broadcast en-cryption scheme with constant-...
We consider the classical problem of synchronous broadcast with dishonest majority, when a public-ke...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption ...
International audienceIn this paper, we describe a new broadcast encryption scheme for stateless rec...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
Abstract. Broadcasting is a very efficient way to securely transmit information to a large set of ge...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Suppose a user wants to broadcast an encrypted message to $K$ recipients. With public-key encryption...
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast e...
We use multilinear maps to provide a solution to the long-standing problem of public-key broadcast e...
We describe two new public key broadcast encryption systems for stateless receivers. Both systems ar...
In this paper, we present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
Abstract. In this paper, we propose a semi-static secure broadcast en-cryption scheme with constant-...
We consider the classical problem of synchronous broadcast with dishonest majority, when a public-ke...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption ...
International audienceIn this paper, we describe a new broadcast encryption scheme for stateless rec...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
Abstract. Broadcasting is a very efficient way to securely transmit information to a large set of ge...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Suppose a user wants to broadcast an encrypted message to $K$ recipients. With public-key encryption...