Identity-Based Trace and Revoke Schemes
From MaRDI portal
Publication:3092358
DOI10.1007/978-3-642-24316-5_15zbMath1298.94102MaRDI QIDQ3092358
Duong Hieu Phan, Viet Cuong Trinh
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_15
broadcast encryption; pirate evolution attacks; Pirates 2.0; subset-cover framework; Traitor tracing
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Traitor Tracing against Public Collaboration
- Fighting Pirates 2.0
- Public Key Broadcast Encryption for Stateless Receivers
- Identity-Based Trace and Revoke Schemes
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Identity-Based Encryption Gone Wild
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Defending against the Pirate Evolution Attack
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Traitors Collaborating in Public: Pirates 2.0
- A Revocation Scheme with Minimal Storage at Receivers
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Information Security and Privacy
- Efficient Traitor Tracing from Collusion Secure Codes
- Identity-Based Traitor Tracing