Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
From MaRDI portal
Publication:2953817
DOI10.1007/978-3-319-49175-2_11zbMath1407.94160OpenAlexW2399491036MaRDI QIDQ2953817
Goichiro Hanaoka, Junji Shikata, Yodai Watanabe
Publication date: 6 January 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-49175-2_11
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Mathematical Theory of Communication
- Provably-secure time-bound hierarchical key assignment schemes
- On some methods for unconditionally secure key distribution and broadcast encryption
- Linear broadcast encryption schemes
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Compact proofs of retrievability
- Unconditionally secure key assignment schemes
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
- Security Notions for Broadcast Encryption
- Public Key Broadcast Encryption for Stateless Receivers
- Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
- Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage
- Fuzzy Identity-Based Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Elements of Information Theory
- Selected Areas in Cryptography
This page was built for publication: Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness