Identity-Based Trace and Revoke Schemes
From MaRDI portal
Publication:3092358
DOI10.1007/978-3-642-24316-5_15zbMath1298.94102OpenAlexW43152956MaRDI QIDQ3092358
Duong Hieu Phan, Viet Cuong Trinh
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_15
Related Items
A survey on functional encryption ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Identity-Based Trace and Revoke Schemes
Cites Work
- Identity-Based Cryptosystems and Signature Schemes
- Traitor Tracing against Public Collaboration
- Fighting Pirates 2.0
- Public Key Broadcast Encryption for Stateless Receivers
- Identity-Based Trace and Revoke Schemes
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Identity-Based Encryption Gone Wild
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Defending against the Pirate Evolution Attack
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Traitors Collaborating in Public: Pirates 2.0
- A Revocation Scheme with Minimal Storage at Receivers
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Information Security and Privacy
- Efficient Traitor Tracing from Collusion Secure Codes
- Identity-Based Traitor Tracing
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Identity-Based Trace and Revoke Schemes