Sciweavers

215 search results - page 7 / 43
» Key Management for Encrypted broadcast
Sort
View
ACISP
2003
Springer
15 years 6 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
CCS
2006
ACM
15 years 6 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
ASIACRYPT
2008
Springer
15 years 4 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
ISW
1997
Springer
15 years 6 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
IJNSEC
2008
124views more  IJNSEC 2008»
15 years 2 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...