[PDF][PDF] Dual-mode broadcast encryption

Y Zhu, R Yu, E Chen, D Huang - Science China. Information …, 2018 - scis.scichina.com
broadcast encryption supporting designation and revocation mechanisms as dual-mode
broadcast encryption … a new scheme of revocationbased broadcast encryption (RBBE). This …

Privacy-Preserving Smart Contracts for Confidential Transactions Using Dual-Mode Broadcast Encryption

H Yin, Y Zhu, G Guo, WCC Chu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… new dual-mode identitybased broadcast encryption (DM-IBBE) scheme to meet specificpurpose
or generic-purpose privacy by using selective encryption mode or exclusive encryption

[PDF][PDF] A comparison on broadcast encryption schemes: A new broadcast encryption scheme

H Bodur, R Kara - Advances in Electrical and Computer …, 2020 - researchgate.net
… new cryptosystem, called dual-mode broadcast encryption. They … a revocable broadcast
encryption scheme suitable for use in … using a dual- system encryption technique with a constant-…

An efficient broadcast encryption supporting designation and revocation mechanisms

Y Zhu, R Yu, E Chen, D Huang - Chinese Journal of …, 2019 - Wiley Online Library
… We then describe the dual-mode broadcast encryption cryptosystem … Dual-Mode Broadcast
Encryption In this section, we present a new scheme, called Dualmode broadcast encryption (…

A dual-mode energy efficient encryption protocol for wireless sensor networks

A Moh'd, N Aslam, W Phillips, W Robertson - Ad hoc networks, 2013 - Elsevier
… Motivated by the above challenges, we present the C-Sec protocol [8], which is a dual mode
encryption protocol for WSNs designed with an objective of reducing communication with a …

A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks

X Han, D Tian, X Duan, Z Sheng, J Zhou… - Proceedings of the 11th …, 2021 - dl.acm.org
… the state-of-the-art broadcast proxy reencryption schemes [2, 14] and AES-GCM scheme in
terms of generation time of re-encrypt key and re-encryption time. The generation times of the …

A mobile peer‐to‐peer approach for multimedia content sharing using 3G/WLAN dual mode channels

SS Kang, MW Mutka - Wireless Communications and Mobile …, 2005 - Wiley Online Library
… Moreover the transmission mechanism is broadcast, which is open to nearby hosts. When
a packet is not encrypted, eavesdropping is possible in ad hoc networks. Much research has …

[PS][PS] Dual-mode multicast for DIS

J Pullen, EL White - 12th Workshop on Standards for the Interoperability …, 1995 - cs.gmu.edu
… We are currently investigating an approach called Dual-Mode Multicast that uses multicast
at the global (WAN) level on a group-per-exercise basis to minimize WAN tra c, while using …

A novel conditional access architecture for TV service protection

J Liu, C Yang, J Tian - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
… In section 4, the dual mode CAS inner structure is designed for … are described to verify the
feasible of the dual mode CAS. … Encryption algorithm is AES and the encryption result is called …

Pairwise Coded mCAP with Chaotic Dual-Mode Index Modulation for Secure Bandlimited VLC Systems

Y Nie, W Zhang, Y Yang, X Deng, M Liu, C Chen - Photonics, 2022 - mdpi.com
… and mode 2, and two encrypted constellation sets M 1 … encrypted constellation sets in the
gth ( g = 1 , ⋯ , G ) subblock is given in Table 1. As we can see, when s g = 0, the two encrypted