Identity-Based Trace and Revoke Schemes (Q3092358): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_15 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W43152956 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Gone Wild / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Traitor Tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Revocation Scheme with Minimal Storage at Receivers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4037500 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Traitor Tracing from Collusion Secure Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Traitors Collaborating in Public: Pirates 2.0 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941864 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343416 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250781 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940701 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fighting Pirates 2.0 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Broadcast Encryption for Stateless Receivers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341773 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Defending against the Pirate Evolution Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pirate Evolution: How to Make the Most of Your Traitor Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737263 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249634 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Broadcast Encryption Scheme Made Efficient / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783719 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536284 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Trace and Revoke Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Traitor Tracing against Public Collaboration / rank
 
Normal rank

Latest revision as of 11:33, 4 July 2024

scientific article
Language Label Description Also known as
English
Identity-Based Trace and Revoke Schemes
scientific article

    Statements

    Identity-Based Trace and Revoke Schemes (English)
    0 references
    0 references
    0 references
    16 September 2011
    0 references
    Traitor tracing
    0 references
    broadcast encryption
    0 references
    subset-cover framework
    0 references
    pirate evolution attacks
    0 references
    Pirates 2.0
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers