Adaptively anonymous public-key broadcast encryption scheme without random oracle

被引:0
|
作者
Wang, Hao [1 ,2 ,3 ]
Wu, Lei [1 ,2 ]
机构
[1] School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China
[2] Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China
[3] Shandong Provincial Key Laboratory of Software Engineering, Jinan 250101, China
关键词
26;
D O I
10.4304/jnw.9.6.1656-1663
中图分类号
学科分类号
摘要
引用
收藏
页码:1656 / 1663
相关论文
共 50 条
  • [21] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [22] Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement
    Lu, Yang
    Wang, Gang
    Li, Jiguo
    INFORMATION SCIENCES, 2019, 479 : 270 - 276
  • [23] Adaptively-secure, non-interactive public-key encryption
    Canetti, R
    Halevi, S
    Katz, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 150 - 168
  • [24] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [25] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [26] AN M3 PUBLIC-KEY ENCRYPTION SCHEME
    WILLIAMS, HC
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 358 - 368
  • [27] ON THE CONCEALABILITY OF MESSAGES BY THE WILLIAMS PUBLIC-KEY ENCRYPTION SCHEME
    KOTHARI, S
    LAKSHMIVARAHAN, S
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1984, 10 (01) : 15 - 24
  • [28] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    Journal of Cryptology, 2007, 20 : 265 - 294
  • [29] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [30] Combining Public-Key Encryption with Digital Signature Scheme
    Alia, Mohammad Ahmad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 870 - 878