搜索结果: 1-15 共查到“密码学 broadcast”相关记录78条 . 查询时间(0.109 秒)
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
broadcast blockchain cryptocurrency peer-to-peer
2019/8/2
In order to propagate transactions and blocks, today’s blockchain systems rely on unstructured peer-to-peer overlay networks. In such networks, broadcast is known to be an inefficient operation in ter...
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
public-key cryptography Standard Assumptions
2019/6/4
We construct a broadcast and trace scheme (also known as trace and revoke or broadcast, trace and revoke) with NN users, where the ciphertext size can be made as low as O(Nϵ)O(Nϵ), for any...
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Witness Encryption Trace and Revoke Broadcast Encryption
2019/1/18
An emerging trend is for researchers to identify cryptography primitives for which feasibility was first established under obfuscation and then move the realization to a different setting. In this wor...
Identity-based Broadcast Encryption with Efficient Revocation
Broadcast encryption revocation asymmetric pairings
2019/1/18
Identity-based broadcast encryption (IBBE) is an effective method to protect the data security and privacy in multi-receiver scenarios, which can make broadcast encryption more practical. This paper f...
Information-Theoretic Broadcast with Dishonest Majority for Long Messages
Byzantine broadcast information-theoretic security dishonest majority
2018/11/16
Byzantine broadcast is a fundamental primitive for secure computation. In a setting with nn parties in the presence of an adversary controlling at most tt parties, while a lot of progress in optimizin...
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
broadcast encryption bilinear group
2018/5/2
We present a new public key broadcast encryption scheme where both the ciphertext and secret keys consist of a constant number of group elements. Our result improves upon the work of Boneh, Gentry, an...
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work
Broadcast Byzantine Agreement Proof of Works
2017/9/25
Inspired by the astonishing success of cryptocurrencies, most notably the Bitcoin system, several recent works have focused on the design of robust blockchain-style protocols that work in a peer-to-pe...
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
broadcast encryption secure multicast wildcard
2017/5/15
Public key broadcast encryption is a cryptographic method to securely transmit a message from anyone to a group of receivers such that only privileged users can decrypt it. A secure multicast system a...
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
anonymous broadcast encryption outsider anonymity ternary subset difference
2017/3/27
This paper puts forward an efficient broadcast encryption in public key setting employing ternary tree subset difference method for revocation. It provides outsider anonymity disabling the revoked use...
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
multiparty NIKE (H)IBE broadcast encryption
2017/2/23
We define the concept of an encryptor combiner. Roughly, such a combiner takes as input n public keys for a public key encryption scheme, and produces a new combined public key. Anyone knowing a secre...
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
recipient revocable broadcast encryption chosen plaintext attack adaptive security
2017/2/20
In this paper, we put forward the first adaptively secure recipient revocable broadcast encryption (RR-BE) scheme in the standard model. The scheme is adaptively secure against chosen plaintext attack...
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Byzantine Broadcast Byzantine Agreement Round complexity
2017/2/20
The problem of Byzantine Broadcast (BB) and Byzantine Agreement (BA) are of interest to both distributed computing and cryptography community. Often, these primitives require prohibitive communication...
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Broadcast encryption Hierarchical identity-based encryption Identity-based multi designated verifier signature
2016/12/10
Hierarchical identity-based broadcast encryption (HIBBE) organizes the users in a tree-like structure in which they can delegate the decryption ability to their subordinates. In addition, the trusted ...
Secure and Efficient Construction of Broadcast Encryption with Dealership
broadcast encryption with dealership chosen plaintext attack maximum number of accountability
2016/12/10
Broadcast encryption with dealership (BED) has been proposed to achieve more innovative and scalable business models for broadcast services. It has an extensive application future. However, designing ...
Collusion Resistant Broadcast Encryption with Tight Reductions and Beyond
Broadcast Encryption Tight Reduction
2016/12/8
The issue of tight security in identity-based encryption scheme (IBE) has been widely investigated.
Recently, a tightly secure IBE scheme of bilinear groups in the weak multi-challenge setting has be...