Security Notions for Broadcast Encryption (Q3011311): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q56921075, #quickstatements; #temporary_batch_1712201099914
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754169 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341773 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783719 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Communication Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decentralized Dynamic Broadcast Encryption / rank
 
Normal rank

Latest revision as of 06:17, 4 July 2024

scientific article
Language Label Description Also known as
English
Security Notions for Broadcast Encryption
scientific article

    Statements

    Security Notions for Broadcast Encryption (English)
    0 references
    0 references
    0 references
    0 references
    28 June 2011
    0 references
    0 references
    broadcast encryption
    0 references
    adaptive security
    0 references
    security models
    0 references
    0 references
    0 references