Fully secure functional encryption for inner products, from standard assumptions
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs
V Shoup - cryptology eprint archive, 2004 - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …
Adaptive security in broadcast encryption systems (with short ciphertexts)
We present new techniques for achieving adaptive security in broadcast encryption systems.
Previous work on fully collusion resistant broadcast encryption systems with very short …
Previous work on fully collusion resistant broadcast encryption systems with very short …
Fully collusion resistant traitor tracing with short ciphertexts and private keys
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts
and constant size private keys. More precisely, let N be the total number of users. Our …
and constant size private keys. More precisely, let N be the total number of users. Our …
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
This paper puts forward new efficient constructions for public-key broadcast encryption that
simultaneously enjoy the following properties: receivers are stateless; encryption is collusion …
simultaneously enjoy the following properties: receivers are stateless; encryption is collusion …
Public key broadcast encryption for stateless receivers
A broadcast encryption scheme allows the sender to securely distribute data to a
dynamically changing set of users over an insecure channel. One of the most challenging …
dynamically changing set of users over an insecure channel. One of the most challenging …
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is
sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke …
sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke …
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our
scheme only needs one (or none if precomputed and provided as a public parameter) …
scheme only needs one (or none if precomputed and provided as a public parameter) …
Side-channel analysis of PUFs and fuzzy extractors
Embedded security systems based on Physical Unclonable Functions (PUFs) offer
interesting protection properties, such as tamper resistance and unclonability. However, to …
interesting protection properties, such as tamper resistance and unclonability. However, to …
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
A forward-secure encryption scheme protects secret keys from exposure by evolving the
keys with time. Forward security has several unique requirements in hierarchical identity …
keys with time. Forward security has several unique requirements in hierarchical identity …