Complete tree subset difference broadcast encryption scheme and its analysis
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 6683489 (Why is no real title available?)
- scientific article; zbMATH DE number 177621 (Why is no real title available?)
- scientific article; zbMATH DE number 1302868 (Why is no real title available?)
- scientific article; zbMATH DE number 1303146 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 2081065 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842486 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- scientific article; zbMATH DE number 1418304 (Why is no real title available?)
- A Revocation Scheme with Minimal Storage at Receivers
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Advances in Cryptology - ASIACRYPT 2003
- Advances in Cryptology – CRYPTO 2004
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Dynamic traitor tracing
- Establishing the broadcast efficiency of the subset difference revocation scheme
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Information Security and Privacy
- Linear broadcast encryption schemes
- Linear key predistribution schemes
- Lower Bounds for Subset Cover Based Broadcast Encryption
- On some methods for unconditionally secure key distribution and broadcast encryption
- On the mean number of encryptions for tree-based broadcast encryption schemes
- One-Way Chain Based Broadcast Encryption Schemes
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Security notions for broadcast encryption
Cited in
(6)- Optimal subset-difference broadcast encryption with free riders
- Ternary Subset Difference Method and Its Quantitative Analysis
- Information Security and Privacy
- Tree based symmetric key broadcast encryption
- How to Construct Interval Encryption from Binary Tree Encryption
- Establishing the broadcast efficiency of the subset difference revocation scheme
This page was built for publication: Complete tree subset difference broadcast encryption scheme and its analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1934221)