Academic literature on the topic 'Broadcast encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Broadcast encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Broadcast encryption"
Yao, Shuang, and Dawei Zhang. "Anonymous Certificate-Based Inner Product Broadcast Encryption." Security and Communication Networks 2021 (August 30, 2021): 1–17. http://dx.doi.org/10.1155/2021/6639835.
Full textZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Full textLee, Jiwon, Seunghwa Lee, Jihye Kim, and Hyunok Oh. "Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption." Sensors 20, no. 11 (June 2, 2020): 3140. http://dx.doi.org/10.3390/s20113140.
Full textBODUR, H., and R. KARA. "A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme." Advances in Electrical and Computer Engineering 20, no. 4 (2020): 69–80. http://dx.doi.org/10.4316/aece.2020.04009.
Full textWANG, FENGHE, XU AN WANG, and CHUNXIAO WANG. "Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540005. http://dx.doi.org/10.1142/s0219265915400058.
Full textPadró, Carles, Ignacio Gracia, Sebastià Martín, and Paz Morillo. "Linear broadcast encryption schemes." Electronic Notes in Discrete Mathematics 6 (April 2001): 35–44. http://dx.doi.org/10.1016/s1571-0653(04)00155-6.
Full textPadró, Carles, Ignacio Gracia, Sebastià Martı́n, and Paz Morillo. "Linear broadcast encryption schemes." Discrete Applied Mathematics 128, no. 1 (May 2003): 223–38. http://dx.doi.org/10.1016/s0166-218x(02)00447-x.
Full textGritti, Clémentine, Willy Susilo, Thomas Plantard, Kaitai Liang, and Duncan S. Wong. "Broadcast encryption with dealership." International Journal of Information Security 15, no. 3 (April 7, 2015): 271–83. http://dx.doi.org/10.1007/s10207-015-0285-x.
Full textLi, Xie, and Ren Yanli. "Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles." International Journal of Digital Crime and Forensics 6, no. 2 (April 2014): 40–51. http://dx.doi.org/10.4018/ijdcf.2014040103.
Full textQi, Zhi Feng, Yin Huang, and Shu Hong Wang. "The Study of Broadcast Encryption on Cable TV Applications." Applied Mechanics and Materials 58-60 (June 2011): 280–85. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.280.
Full textDissertations / Theses on the topic "Broadcast encryption"
Anderson, Kristin. "Tree Structures in Broadcast Encryption." Licentiate thesis, Linköping : Linköpings universitet, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4651.
Full textHesselius, Tobias, and Tommy Savela. "A Java Framework for Broadcast Encryption Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2504.
Full textBroadcast encryption is a fairly new area in cryptology. It was first addressed in 1992, and the research in this area has been large ever since. In short, broadcast encryption is used for efficient and secure broadcasting to an authorized group of users. This group can change dynamically, and in some cases only one-way communication between the sender and receivers is available. An example of this is digital TV transmissions via satellite, in which only the paying customers can decrypt and view the broadcast.
The purpose of this thesis is to develop a general Java framework for implementation and performance analysis of broadcast encryption algorithms. In addition to the actual framework a few of the most common broadcast encryption algorithms (Complete Subtree, Subset Difference, and the Logical Key Hierarchy scheme) have been implemented in the system.
This master’s thesis project was defined by and carried out at the Information Theory division at the Department of Electrical Engineering (ISY), Linköping Institute of Technology, during the first half of 2004.
Martin, Thomas. "A set theoretic approach to broadcast encryption." Thesis, Royal Holloway, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415905.
Full textGreveler, Ulrich. "Applications of broadcast encryption schemes and related technical mechanisms for digital rights management of multimedia broadcasts." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=980659051.
Full textQuaglia, Elizabeth. "Anonymity and time in public-key encryption." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/.
Full textHuber, Ulrich [Verfasser]. "On Broadcast Encryption for Secure Software Delivery to Automobiles / Ulrich Huber." Aachen : Shaker, 2007. http://d-nb.info/1164340921/34.
Full textCoetzee, Dirk Badenhorst. "The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80292.
Full textENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to broadcast the same collection of information to several receiving parties while only allowing a certain subset of the receiving parties to access the information. This system must still be secure in the scenario where all receiving parties who are not allowed access to the information, pool their resources in an attempt to gain access to the information. Such a product entitlement system must also be bandwidth e cient since it can be deployed in networks where bandwidth is at a premium. The foundations of modern encryption techniques is reviewed and a survey of existing techniques, used to secure content in broadcast environments, is studied. From this collection of techniques two were identi ed as bandwidth e cient and are discussed in more detail before being implemented. An attempt is then made to design a new secure bandwidth e cient encryption scheme for protecting content in a broadcast environment. Several iterations of the design is detailed, including the security aw which makes each design insecure. The nal design was implemented and compared in several metrics to the two previously selected bandwidth e cient schemes. A framework to test the correctness of the schemes over a network is also designed and implemented. Possible future avenues of research are identi ed with regards to creating a secure broadcast encryption scheme and improving the software solution in which to use such a scheme.
AFRIKAANSE OPSOMMING: 'n Veilige produk-aanspraak-stelsel stel een party, soos byvoorbeeld 'n betaal-TV-operateur, in staat om dieselfde versameling inligting na verskeie partye uit te saai, terwyl slegs 'n bepaalde deelversameling van die ontvangende partye toegelaat sal word om toegang tot die inligting te bekom. Hierdie stelsel moet steeds die inligting beskerm in die geval waar al die ontvangende partye wat toegang geweier word, hul hulpbronne saamsmee in 'n poging om toegang te verkry. So 'n produk-aanspraak-stelsel moet ook bandwydte doeltre end benut, aangesien dit gebruik kan word in netwerke waar bandwydte baie duur is. Die fondamente van die moderne enkripsietegnieke word hersien. 'n Opname van bestaande tegnieke wat gebruik word om inligting te beskerm in 'n uitsaai omgewing word bestudeer. Uit hierdie versameling tegnieke word twee geïdenti seer as tegnieke wat bandwydte doeltre end benut en word meer volledig bespreek voordat dit geïmplementeer word. 'n Poging word dan aangewend om 'n nuwe veilige bandwydte doeltre ende enkripsietegniek te ontwerp vir die beskerming van inligting wat uitgesaai word. Verskeie iterasies van die ontwerp word uiteengesit, met 'n bespreking van die sekuriteitsfout wat elke ontwerp onveilig maak. Die nale ontwerp is geïmplementeer en aan die hand van verskeie maatstawwe vergelyk met die twee bandwydte doeltre ende tegnieke, wat voorheen gekies is. 'n Raamwerk om die korrektheid van die tegnieke oor 'n netwerk te toets, is ook ontwerp en geïmplementeer. Moontlike toekomstige rigtings van navorsing word geïdenti seer met betrekking tot die skep van 'n veilige uitsaai enkripsietegniek en die verbetering van die sagtewareoplossing wat so 'n tegniek gebruik.
Malek, Behzad. "Light-Weight Authentication Schemes with Applications to RFID Systems." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19937.
Full textHvězda, Vojtěch. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241507.
Full textBarthoulot, Anaïs. "Chiffrement avancé pour le partage de données sensibles." Electronic Thesis or Diss., Limoges, 2023. http://www.theses.fr/2023LIMO0067.
Full textData, including private information, plays a pivotal role in our daily lives today. Current research predominantly focuses on data storage, with an emphasis on the ability to securely process data even when it is encrypted. However, beyond mere preservation, data must also be shared in various ways: either among an individual and a group of individuals, sometimes bound by common characteristics defining sharing rules, or simply between two individuals. Currently, these different modes of sharing are not yet well-mastered, either due to their high performance cost or limited functionalities. This thesis delves into various encryption schemes tailored for sharing sensitive data, proposing new constructions. Firstly, we investigate two cryptographic primitives: identity-based encryption schemes with wildcards and cryptographic accumulators, which serve as a starting point for our new constructions. Regarding identity-based encryption schemes with wildcards, we introduce a new security property and propose two new instantiations, one of which satisfies this new security property that we have defined. For cryptographic accumulators, we present a new type of accumulator, an improved scheme compared to the state of the art, and a second scheme illustrating our new functionality. We also introduce a new security property for this primitive and raise numerous questions concerning various properties of the latter. Finally, we explore the construction of encryption schemes suited for data sharing using the two aforementioned primitives. We propose a generic construction of a group encryption scheme (including "augmented" group encryption) based on identity-based encryption schemes with wildcards. With our instantiations of the primitive, we achieve a new group encryption scheme that enhances the state of the art by offering adaptive security rather than just selective, while preserving the efficiency of the best schemes due to a constant ciphertext size. For "augmented" group encryption schemes, the combination of one of our instantiations of identity-based encryption schemes with wildcards and our generic construction enables us to obtain a new scheme, the first to guarantee adaptive security in the standard model. Unfortunately, in terms of efficiency, our scheme is no more efficient than a "trivial" solution. However, thanks to our generic constructions, an enhancement of the underlying primitive will contribute to improving "augmented" group encryption schemes. We also propose an attribute-based encryption scheme using our new type of accumulators. This scheme is the first to offer a constant size for the secret key and ciphertext, regardless of the number of attributes in the scheme, while guaranteeing adaptive security. However, this efficiency comes at the cost of an exponential size for the public key, and our construction, relying on specific features of our new accumulator instantiation with pairings, cannot be generalized. Finally, through a concrete use case, we introduce a novel approach to access control using identity-based encryption schemes with wildcards
Books on the topic "Broadcast encryption"
Anderson, Kristin. Tree structures in broadcast encryption. Linköping: Linköpings universitet, 2005.
Find full textConditional Identity Broadcast based Proxy Re-Encryption Technique for Data Encryption in Cloud. Karur, India: ASDF International, 2017.
Find full textCopeland, B. J., ed. The Essential Turing. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780198250791.001.0001.
Full textBook chapters on the topic "Broadcast encryption"
Kiayias, Aggelos, and Serdar Pehlivanoglu. "Broadcast Encryption." In Advances in Information Security, 35–105. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9_2.
Full textNaor, Dalit. "Broadcast Encryption." In Encyclopedia of Cryptography and Security, 171–74. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_143.
Full textNaor, Dalit. "Broadcast Encryption." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_143-2.
Full textRamkumar, Mahalingam. "Broadcast Authentication and Broadcast Encryption." In Symmetric Cryptographic Protocols, 135–62. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07584-6_8.
Full textMaitra, Subhamoy, Goutam Paul, and Sourav Sen Gupta. "Attack on Broadcast RC4 Revisited." In Fast Software Encryption, 199–217. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9_12.
Full textPhan, Duong Hieu, David Pointcheval, and Mario Strefler. "Decentralized Dynamic Broadcast Encryption." In Lecture Notes in Computer Science, 166–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32928-9_10.
Full textWu, Qianhong, Bo Qin, Lei Zhang, and Josep Domingo-Ferrer. "Fully Distributed Broadcast Encryption." In Provable Security, 102–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24316-5_9.
Full textGaray, Juan A., Jessica Staddon, and Avishai Wool. "Long-Lived Broadcast Encryption." In Advances in Cryptology — CRYPTO 2000, 333–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_21.
Full textMantin, Itsik, and Adi Shamir. "A Practical Attack on Broadcast RC4." In Fast Software Encryption, 152–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x_13.
Full textIsobe, Takanori, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii. "Full Plaintext Recovery Attack on Broadcast RC4." In Fast Software Encryption, 179–202. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3_10.
Full textConference papers on the topic "Broadcast encryption"
Phan, Duong Hieu, David Pointcheval, and Viet Cuong Trinh. "Multi-channel broadcast encryption." In the 8th ACM SIGSAC symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484313.2484348.
Full textAli, Mohamed, Hamza Ali, Ting Zhong, Fagen Li, Zhiguan Qin, and Ahmed Abdelrahaman A. A. "Broadcast Searchable Keyword Encryption." In 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE). IEEE, 2014. http://dx.doi.org/10.1109/cse.2014.201.
Full textWu, Qianhong, Bo Qin, Lei Zhang, and Josep Domingo-Ferrer. "Ad hoc broadcast encryption." In the 17th ACM conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866307.1866416.
Full textEskeland, Sigurd. "Fully threshold broadcast encryption." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103159.
Full textCesena, Emanuele, Gianluca Ramunno, and Davide Vernizzi. "Towards Trusted Broadcast Encryption." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.499.
Full textTan, Chik How, Joseph Chee Ming Teo, and Jens-Are Amundsen. "Authenticated Broadcast Encryption Scheme." In 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.104.
Full textLi, Tao, Huaqun Guo, and Maode Ma. "Hybrid multimedia broadcast encryption schemes." In 2012 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2012. http://dx.doi.org/10.1109/wcnc.2012.6214238.
Full textKaskaloglu, Kerem, Kamer Kaya, and Ali Aydin Selcuk. "Threshold broadcast encryption with reduced complexity." In 2007 22nd international symposium on computer and information sciences. IEEE, 2007. http://dx.doi.org/10.1109/iscis.2007.4456880.
Full textElkamchouchi, Hassan, and Yasmine Abouelseoud. "Broadcast Encryption Schemes: A Comparative Study." In 2007 IEEE International Conference on Signal Processing and Communications. IEEE, 2007. http://dx.doi.org/10.1109/icspc.2007.4728415.
Full textSusilo, Willy, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, and Yang-Wai Chow. "Recipient Revocable Identity-Based Broadcast Encryption." In ASIA CCS '16: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897845.2897848.
Full text