International audienceWe provide efficient constructions for trace-and-revoke systemswith public traceability in the black-box confirmationmodel. Our constructions achieve adaptive security, are basedon standard assumptions and achieve significant efficiencygains compared to previous constructions.Our constructions rely on a generic transformation frominner product functional encryption (IPFE) schemes to traceand-revoke systems. Our transformation requires the underlyingIPFE scheme to only satisfy a very weak notion of security– the attacker may only request a bounded number of randomkeys – in contrast to the standard notion of security whereshe may request an unbounded number of arbitrarily chosenkeys. We exploit the much weaker security m...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
International audienceWe provide efficient constructions for trace-and-revoke systemswith public tra...
International audienceWe address the problem of designing an efficient broadcast encryption scheme w...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
This thesis considers a number of challenging aspects in multi-user cryptosystems such as traitor tr...
Our goal is to design encryption schemes for mass distribution of data in which it is possible to (1...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
International audienceWe provide efficient constructions for trace-and-revoke systemswith public tra...
International audienceWe address the problem of designing an efficient broadcast encryption scheme w...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
This thesis considers a number of challenging aspects in multi-user cryptosystems such as traitor tr...
Our goal is to design encryption schemes for mass distribution of data in which it is possible to (1...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...