Traitor-tracing from LWE made simple and attribute-based (Q1631335): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_13 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2951603772 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Traitor Tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger security for reusable garbled circuits, general definitions and attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional encryption for bounded collusions, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Homomorphic PRFs and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraining Pseudorandom Functions Privately / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical hardness of learning with errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private constrained PRFs (and more) from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: GGH15 beyond permutation branching programs: proofs, attacks, and candidates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940701 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion resistant traitor tracing from learning with errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandomness of ring-LWE for any ring and modulus / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank

Latest revision as of 15:02, 17 July 2024

scientific article
Language Label Description Also known as
English
Traitor-tracing from LWE made simple and attribute-based
scientific article

    Statements

    Traitor-tracing from LWE made simple and attribute-based (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    6 December 2018
    0 references
    0 references
    0 references
    0 references