Indentity-based broadcast signcryption

作者: Fagen Li , Xiangjun Xin , Yupu Hu

DOI: 10.1016/J.CSI.2007.08.005

关键词:

摘要: Broadcast encryption schemes allow a center to deliver encrypted data to a large set of users so that only a particular subset of privileged users can decrypt it. Most of previous works …

参考文章(36)
Amos Fiat, Tamir Tassa, Dynamic Traitor Tracing Journal of Cryptology. ,vol. 14, pp. 211- 223 ,(2001) , 10.1007/S00145-001-0006-7
Liqun Chen, John Malone-Lee, Improved Identity-Based Signcryption Public Key Cryptography - PKC 2005. pp. 362- 379 ,(2005) , 10.1007/978-3-540-30580-4_25
Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto, A Quick Group Key Distribution Scheme with “Entity Revocation” Advances in Cryptology - ASIACRYPT’99. pp. 333- 347 ,(1999) , 10.1007/978-3-540-48000-6_27
Juan A. Garay, Jessica Staddon, Avishai Wool, Long-Lived Broadcast Encryption international cryptology conference. pp. 333- 352 ,(2000) , 10.1007/3-540-44598-6_21
Ron Steinfeld, Yuliang Zheng, A Signcryption Scheme Based on Integer Factorization Lecture Notes in Computer Science. pp. 308- 322 ,(2000) , 10.1007/3-540-44456-4_23
Reihaneh Safavi-Naini, Yejing Wang, Sequential Traitor Tracing international cryptology conference. pp. 316- 332 ,(2000) , 10.1007/3-540-44598-6_20
D. R. Stinson, R. Wei, Key Preassigned Traceability Schemes for Broadcast Encryption Selected Areas in Cryptography. pp. 144- 156 ,(1999) , 10.1007/3-540-48892-8_12
Dani Halevy, Adi Shamir, The LSD Broadcast Encryption Scheme international cryptology conference. pp. 47- 60 ,(2002) , 10.1007/3-540-45708-9_4
John Malone-Lee, Wenbo Mao, Two Birds One Stone: Signcryption Using RSA Topics in Cryptology — CT-RSA 2003. pp. 211- 226 ,(2003) , 10.1007/3-540-36563-X_14