Secure anonymous broadcast
M Movahedi, J Saia, M Zamani - arXiv preprint arXiv:1405.5326, 2014 - arxiv.org
… ], secure auctions [20], and multi-party computation (MPC). Our goal is to design a decentralized
anonymous broadcast … that enables provably-anonymous broadcast of messages. One …
anonymous broadcast … that enables provably-anonymous broadcast of messages. One …
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
… We start by giving a unified security definition for Anonymous Broadcast Encryption (ANOBE).
Instead of separating anonymity and confidentiality as in [5], we use a combined security …
Instead of separating anonymity and confidentiality as in [5], we use a combined security …
Secure anonymous broadcasting in vehicular networks
C Laurendeau, M Barbeau - 32nd IEEE Conference on Local …, 2007 - ieeexplore.ieee.org
… protocol for the secure and anonymous propagation of vehicle safety broadcast messages.
A … In this paper, we introduce the Secure Anonymous Broadcasting (SAB) protocol for the …
A … In this paper, we introduce the Secure Anonymous Broadcasting (SAB) protocol for the …
Towards {Provably-Secure} Scalable Anonymous Broadcast
… provably-secure protocol for fully-anonymous broadcast in … secure multi-party computation
(MPC) to ensure anonymity. … (n2) to O(n) per anonymous message sent in a network of size n; …
(MPC) to ensure anonymity. … (n2) to O(n) per anonymous message sent in a network of size n; …
Похожие запросы
- adaptive security anonymous broadcast encryption
- anonymous broadcast encryption scheme
- anonymous broadcast authentication
- broadcast encryption chosen ciphertext security
- vehicular networks anonymous broadcasting
- secure multiparty computation anonymous messaging
- broadcast encryption anonymous identity
- efficient constructions anonymous broadcast encryption
Efficient anonymous broadcast encryption with adaptive security
FC Zhou, MQ Lin, Y Zhou, YX Li - KSII Transactions on Internet and …, 2015 - koreascience.kr
… In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that
… Security proofs show that, the proposed scheme is both secure and anonymous under the …
… Security proofs show that, the proposed scheme is both secure and anonymous under the …
[PDF][PDF] Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security.
Z Newman, S Servan-Schreiber… - IACR Cryptol. ePrint …, 2021 - sachaservanschreiber.com
… security are applicable to other systems for anonymous broad… Compared to the state-of-the-art
in cryptographic anonymous … commensurately cheaper) in a broadcast setting. Deployed …
in cryptographic anonymous … commensurately cheaper) in a broadcast setting. Deployed …
Blinder--Scalable, Robust Anonymous Committed Broadcast
… for anonymous committed broadcast. Blinder maintains both properties of security (anonymity…
Blinder obtains its security and scalability by carefully combining classical and state-of-the-…
Blinder obtains its security and scalability by carefully combining classical and state-of-the-…
Anonymous identity-based broadcast encryption with chosen-ciphertext security
… In Section 4, we present our anonymous IBBE scheme and prove its security. In Section 5,
we compare the performance and the simulation results between our scheme and the other …
we compare the performance and the simulation results between our scheme and the other …
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata - International Conference on Advanced …, 2021 - Springer
… of the broadcast … anonymous broadcast authentication (ABA) as its core cryptographic
primitive. We formally define the syntax and security notions for ABA and show provably-secure …
primitive. We formally define the syntax and security notions for ABA and show provably-secure …
Anonymity in wireless broadcast networks
M Blaze, J Ioannidis, AD Keromytis, TG Malkin… - 2009 - academiccommons.columbia.edu
… research area for anonymity and identity protection. In particular, we introduce a security
model for privacy in such networks, a suite of protocols that provide anonymity under the model, …
model for privacy in such networks, a suite of protocols that provide anonymity under the model, …