{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T01:41:02Z","timestamp":1768700462761,"version":"3.49.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031911309","type":"print"},{"value":"9783031911316","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91131-6_12","type":"book-chapter","created":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T14:29:20Z","timestamp":1745764160000},"page":"336-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Generic Approach to\u00a0Adaptively-Secure Broadcast Encryption in\u00a0the\u00a0Plain Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5244-7222","authenticated-orcid":false,"given":"Yao-Ching","family":"Hsieh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9718-8623","authenticated-orcid":false,"given":"Brent","family":"Waters","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5191-692X","authenticated-orcid":false,"given":"David J.","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Applebaum, B., Beimel, A., Ishai, Y., Kushilevitz, E., Liu, T., Vaikuntanathan, V.: Succinct computational secret sharing. In: STOC (2023)","DOI":"10.1145\/3564246.3585127"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Tomida, J.: A modular approach to registered ABE for unbounded predicates. In: CRYPTO (2024)","DOI":"10.1007\/978-3-031-68382-4_9"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Wichs, D., Yamada, S.: Optimal broadcast encryption from LWE and pairings in the standard model. In: TCC (2020)","DOI":"10.1007\/978-3-030-64375-1_6"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Yamada, S.: Optimal broadcast encryption from pairings and LWE. In: EUROCRYPT (2020)","DOI":"10.1007\/978-3-030-45721-1_2"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT (2005)","DOI":"10.1007\/11426639_26"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO (2005)","DOI":"10.1007\/11535218_16"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemp. Math. 324(1) (2003)","DOI":"10.1090\/conm\/324\/05731"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Constrained key-homomorphic PRFs from standard lattice assumptions - or: how to secretly embed a circuit in your PRF. In: TCC (2015)","DOI":"10.1007\/978-3-662-46497-7_1"},{"key":"12_CR9","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Lattice-inspired broadcast encryption and succinct ciphertext-policy ABE. In: ITCS (2022)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM CCS (2006)","DOI":"10.1145\/1180405.1180432"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Boyen, X., Waters, B.: Shrinking the keys of discrete-log-type lossy trapdoor functions. In: ACNS (2010)","DOI":"10.1007\/978-3-642-13708-2_3"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: ASIACRYPT (2013)","DOI":"10.1007\/978-3-642-42045-0_15"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. In: CRYPTO (2014)","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: CRYPTO (2014)","DOI":"10.1007\/978-3-662-44371-2_27"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Chen, J., Gay, R., Wee, H.: Improved dual system ABE in prime-order groups via predicate encodings. In: EUROCRYPT (2015)","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"12_CR16","unstructured":"Champion, J., Hsieh, Y.-C., Wu, D.J.: Registered ABE and adaptively-secure broadcast encryption from succinct LWE. IACR Cryptology ePrint Archive (2025). https:\/\/eprint.iacr.org\/2025\/044.pdf"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Champion, J., Wu, D.J.: Distributed broadcast encryption from lattices. In: TCC (2024)","DOI":"10.1007\/978-3-031-78020-2_6"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: ACM CCS (2002)","DOI":"10.1007\/978-3-540-44993-5_5"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Escala, A., Herold, G., Kiltz, E., R\u00e0fols, C., Villar, J.L.: An algebraic framework for Diffie-Hellman assumptions. In: CRYPTO (2013)","DOI":"10.1007\/978-3-642-40084-1_8"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Erd\u00f6s, P., Tur\u00e1n, P.: On some sequences of integers. J. Lond. Math. Soc. 1(4) (1936)","DOI":"10.1112\/jlms\/s1-11.4.261"},{"key":"12_CR21","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: CRYPTO (1993)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Freitag, C., Waters, B., Wu, D.J.: How to use (plain) witness encryption: registered ABE, flexible broadcast, and more. In: CRYPTO (2023)","DOI":"10.1007\/978-3-031-38551-3_16"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Garg, S., Kumarasubramanian, A., Sahai, A., Waters, B.: Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: ACM CCS (2010)","DOI":"10.1145\/1866307.1866322"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Gay, R., Kowalczyk, L., Wee, H.: Tight adaptively secure broadcast encryption with short ciphertexts and keys. In: SCN (2018)","DOI":"10.1007\/978-3-319-98113-0_7"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC (1989)","DOI":"10.1145\/73007.73010"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Garg, R., Lu, G., Waters, B., Wu, D.J.: Reducing the CRS size in registered ABE systems. In: CRYPTO (2024)","DOI":"10.1007\/978-3-031-68382-4_5"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Goyal, R., Quach, W., Waters, B., Wichs, D.: Broadcast and trace with $$n^{\\varepsilon }$$ ciphertext size from standard assumptions. In: CRYPTO (2019)","DOI":"10.1007\/978-3-030-26954-8_27"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: CRYPTO (2004)","DOI":"10.1007\/978-3-540-28628-8_31"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Goyal, R., Vusirikala, S., Waters, B.: Collusion resistant broadcast and trace from positional witness encryption. In: PKC (2019)","DOI":"10.1007\/978-3-030-17259-6_1"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: EUROCRYPT (2009)","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Hsiao, C.-Y., Lu, C.-J., Reyzin, L.: Conditional computational entropy, or toward separating pseudoentropy from compressibility. In: EUROCRYPT (2007)","DOI":"10.1007\/978-3-540-72540-4_10"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Lu, G., Waters, B., Wu, D.J.: Registered attribute-based encryption. In: EUROCRYPT (2023)","DOI":"10.1007\/978-3-031-30620-4_17"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: CRYPTO (2002)","DOI":"10.1007\/3-540-45708-9_4"},{"key":"12_CR34","unstructured":"Hsieh, Y.-C., Waters, B., Wu, D.J.: A generic approach to adaptively-secure broadcast encryption in the plain model. IACR Cryptology ePrint Archive (2025). https:\/\/eprint.iacr.org\/2025\/323.pdf"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Kolonelos, D., Malavolta, G., Wee, H.: Distributed broadcast encryption from bilinear groups. In: ASIACRYPT (2023)","DOI":"10.1007\/978-981-99-8733-7_13"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Lipmaa, H.: Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In: TCC (2012)","DOI":"10.1007\/978-3-642-28914-9_10"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: CRYPTO (2001)","DOI":"10.1007\/3-540-44647-8_3"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Financial Cryptography (2000)","DOI":"10.1007\/3-540-45472-1_1"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC (2005)","DOI":"10.1145\/1060590.1060603"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Tsabary, R.: Candidate witness encryption from lattice techniques. In: CRYPTO (2022)","DOI":"10.1007\/978-3-031-15802-5_19"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Vaikuntanathan, V., Wee, H., Wichs, D.: Witness encryption and null-IO from evasive LWE. In: ASIACRYPT (2022)","DOI":"10.1007\/978-3-031-22963-3_7"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Wee, H.: Broadcast encryption with size $$n^{1\/3}$$ and more from $$k$$-lin. In: CRYPTO (2021)","DOI":"10.1007\/978-3-030-84259-8_6"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Wee, H.: Optimal broadcast encryption and CP-ABE from evasive lattice assumptions. In: EUROCRYPT (2022)","DOI":"10.1007\/978-3-031-07085-3_8"},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Wee, H.: Circuit ABE with $${\\sf poly}(\\text{depth}, \\lambda )$$-sized ciphertexts and keys from lattices. In: CRYPTO (2024)","DOI":"10.1007\/978-3-031-68382-4_6"},{"key":"12_CR46","unstructured":"Wee, H.: Almost optimal KP and CP-ABE for circuits from succinct LWE. In: EUROCRYPT (2025)"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J.: Ad hoc broadcast encryption. In: ACM CCS (2010)","DOI":"10.1145\/1866307.1866416"},{"key":"12_CR48","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Zhang, K., Gong, J., Qian, H.: Registered ABE via predicate encodings. In: ASIACRYPT (2023)","DOI":"10.1007\/978-981-99-8733-7_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91131-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T14:29:46Z","timestamp":1745764186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91131-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031911309","9783031911316"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91131-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}