Several broadcast encryption (BE) constructions have been proposed since Fiat and Naor introduced the concept, some achieving short parameters size while others achieve better security. Since 1994, a lot of alternatives to BE have moreover been additionally proposed, such as the broadcast and trace (BT) primitive which is a combination of broadcast encryption and traitor tracing. Among the other variants of BE, the notion of augmented BE (AugBE), introduced by Boneh and Waters in 2006, corresponds to a BE scheme with the particularity that the encryption algorithm takes an index as an additional parameter. If an AugBE scheme is both message and index hiding, it has been proved that it can generically be used to construct a secure BT scheme....
© 2020, Innovative Information Science and Technology Research Group. All rights reserved. Wildcard ...
In the standard setting of broadcast encryption, information about the receivers is transmitted as p...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
Several broadcast encryption (BE) constructions have been proposed since Fiat and Naor introduced th...
International audienceSeveral broadcast encryption (BE) constructions have been proposed since Fiat ...
International audienceWe investigate anonymous broadcast encryptions (ANOBE) in which a ciphertext h...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
Attribute Based Broadcast Encryption (ABBE) is a combination of Attribute Based Encryption (ABE) and...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
In this thesis, we look at definitions and black-box constructions with efficient instantiations for br...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
International audienceIn this paper, we describe a new broadcast encryption scheme for stateless rec...
A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of p...
© 2020, Innovative Information Science and Technology Research Group. All rights reserved. Wildcard ...
In the standard setting of broadcast encryption, information about the receivers is transmitted as p...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
Several broadcast encryption (BE) constructions have been proposed since Fiat and Naor introduced th...
International audienceSeveral broadcast encryption (BE) constructions have been proposed since Fiat ...
International audienceWe investigate anonymous broadcast encryptions (ANOBE) in which a ciphertext h...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
Attribute Based Broadcast Encryption (ABBE) is a combination of Attribute Based Encryption (ABE) and...
International audienceBroadcast Encryption is a fundamental cryptographic primitive, that gives the ...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
In this thesis, we look at definitions and black-box constructions with efficient instantiations for br...
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption sche...
International audienceIn this paper, we describe a new broadcast encryption scheme for stateless rec...
A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of p...
© 2020, Innovative Information Science and Technology Research Group. All rights reserved. Wildcard ...
In the standard setting of broadcast encryption, information about the receivers is transmitted as p...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...