© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a message to multiple identities efficiently. Nevertheless, since IBBE is based on identity-based cryptography (IBC), it suffers from the inherent key escrow problem. As a consequence, not only the user knows its private key, but also the private key generator (PKG). This property leads to that the creator of a given pirated private key, named a private key from an unknown source, is untraceable since both the PKG and suspected user can generate such a pirated private key for this identity. To mitigate this problem, accountable authority IBBE (A-IBBE) was proposed to provide accountability for IBBE, where white-box A-IBBE can distinguish the creato...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
International audienceAt Crypto'07, Goyal introduced the concept of Accountable Authority Identity-B...
In the identity-based broadcast encryption (IBBE), only these users whose identities are chosen in t...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
International audienceAt Crypto'07, Goyal introduced the concept of Accountable Authority Identity-B...
In the identity-based broadcast encryption (IBBE), only these users whose identities are chosen in t...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...