Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016 - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs

V Shoup - cryptology eprint archive, 2004 - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …

Adaptive security in broadcast encryption systems (with short ciphertexts)

C Gentry, B Waters - Annual International Conference on the Theory and …, 2009 - Springer
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …

Fully collusion resistant traitor tracing with short ciphertexts and private keys

D Boneh, A Sahai, B Waters - … International Conference on the Theory and …, 2006 - Springer
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts
and constant size private keys. More precisely, let N be the total number of users. Our …

Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys

C Delerablée, P Paillier, D Pointcheval - International conference on …, 2007 - Springer
This paper puts forward new efficient constructions for public-key broadcast encryption that
simultaneously enjoy the following properties: receivers are stateless; encryption is collusion …

Public key broadcast encryption for stateless receivers

Y Dodis, N Fazio - Digital Rights Management: ACM CCS-9 Workshop …, 2003 - Springer
A broadcast encryption scheme allows the sender to securely distribute data to a
dynamically changing set of users over an insecure channel. One of the most challenging …

A fully collusion resistant broadcast, trace, and revoke system

D Boneh, B Waters - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is
sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke …

Efficient multi-receiver identity-based encryption and its application to broadcast encryption

J Baek, R Safavi-Naini, W Susilo - Public Key Cryptography-PKC 2005: 8th …, 2005 - Springer
In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our
scheme only needs one (or none if precomputed and provided as a public parameter) …

Side-channel analysis of PUFs and fuzzy extractors

D Merli, D Schuster, F Stumpf, G Sigl - … 2011, Pittsburgh, PA, USA, June 22 …, 2011 - Springer
Embedded security systems based on Physical Unclonable Functions (PUFs) offer
interesting protection properties, such as tamper resistance and unclonability. However, to …

ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

D Yao, N Fazio, Y Dodis, A Lysyanskaya - Proceedings of the 11th ACM …, 2004 - dl.acm.org
A forward-secure encryption scheme protects secret keys from exposure by evolving the
keys with time. Forward security has several unique requirements in hierarchical identity …