The following pages link to (Q4341773):
Displaying 50 items.
- Multi-designated receiver signed public key encryption (Q2170065) (← links)
- Anonymous certificate-based broadcast encryption with constant decryption cost (Q2195299) (← links)
- On non-binary traceability set systems (Q2200518) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Confidential gossip (Q2204776) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Efficient anonymous multi-group broadcast encryption (Q2229276) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- Revocable identity-based encryption with server-aided ciphertext evolution (Q2310741) (← links)
- Distributing hash families with few rows (Q2333821) (← links)
- DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys (Q2335945) (← links)
- A sequence approach to linear perfect hash families (Q2384060) (← links)
- Pirate decoder for the broadcast encryption schemes from Crypto 2005 (Q2385401) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- Key regression from constrained pseudorandom functions (Q2414039) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- Chosen ciphertext secure identity-based broadcast encryption in the standard model (Q2440178) (← links)
- Multicast key distribution schemes based on Stinson-Van Trung designs (Q2467981) (← links)
- Geometric constructions of optimal linear perfect hash families (Q2469464) (← links)
- On \(\tau\)-time secure key agreement (Q2515458) (← links)
- A public-key traitor tracing scheme with revocation using dynamic shares (Q2572960) (← links)
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service (Q2666761) (← links)
- Blind key-generation attribute-based encryption for general predicates (Q2673977) (← links)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions (Q2692377) (← links)
- Déjà Q: Encore! Un Petit IBE (Q2799097) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Constrained PRFs for Unbounded Inputs with Short Keys (Q2822688) (← links)
- A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks (Q2864182) (← links)
- Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts (Q2864362) (← links)
- Linear Time Constructions of Some $$d$$-Restriction Problems (Q2947011) (← links)
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness (Q2953817) (← links)
- Secure and Efficient Construction of Broadcast Encryption with Dealership (Q2953866) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems (Q3005592) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- The GGM Function Family Is a Weakly One-Way Family of Functions (Q3179353) (← links)
- Conjunctive Broadcast and Attribute-Based Encryption (Q3392916) (← links)
- Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering (Q3407287) (← links)
- Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution (Q3452368) (← links)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts (Q3503869) (← links)
- Attribute-Based Broadcast Encryption Scheme Made Efficient (Q3506391) (← links)
- Lower Bounds for Subset Cover Based Broadcast Encryption (Q3506392) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- Generalized Identity Based and Broadcast Encryption Schemes (Q3600391) (← links)
- Ternary Subset Difference Method and Its Quantitative Analysis (Q3605394) (← links)