scientific article; zbMATH DE number 177621
From MaRDI portal
Publication:4037500
Recommendations
Cited in
(28)- Tree based symmetric key broadcast encryption
- Lower Bounds for Subset Cover Based Broadcast Encryption
- scientific article; zbMATH DE number 1612521 (Why is no real title available?)
- How to share a secret
- On \(\tau\)-time secure key agreement
- Black-box Trace\&Revoke codes
- How to Leak a Secret and Reap the Rewards Too
- Broadcast encryption scheme based on secret sharing
- Optimal subset-difference broadcast encryption with free riders
- Complete tree subset difference broadcast encryption scheme and its analysis
- Establishing the broadcast efficiency of the subset difference revocation scheme
- Ternary Subset Difference Method and Its Quantitative Analysis
- Fighting Pirates 2.0
- Cryptanalysis of Liaw's broadcasting cryptosystem
- Broadcasting cryptosystem in computer networks
- A note on the security of KHL scheme
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Identity-based trace and revoke schemes
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Unconditional secure conference key distribution schemes with disenrollment capability
- How to Share a Secret, Infinitely
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
- Linear broadcast encryption schemes
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Pirate decoder for the broadcast encryption schemes from Crypto 2005
- An application of ramp schemes to broadcast encryption
- A novel group key transfer for big data security
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4037500)