Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

From MaRDI portal
Publication:4414701


DOI10.1007/3-540-36288-6_8zbMath1033.94522MaRDI QIDQ4414701

Yevgeniy Dodis, Nelly Fazio

Publication date: 27 July 2003

Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36288-6_8


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

Efficient Broadcast Encryption with Personalized Messages, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Efficient Traitor Tracing from Collusion Secure Codes, Scalable public-key tracing and revoking, Black-box Trace\&Revoke codes, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, A note on the security of KHL scheme, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Identity-based broadcast encryption with shorter transmissions, Efficient provably-secure hierarchical key assignment schemes, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Complete tree subset difference broadcast encryption scheme and its analysis, Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Traceable secret sharing and applications, White box traitor tracing, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Pirate decoder for the broadcast encryption schemes from Crypto 2005, Step-out group signatures, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Security Notions for Broadcast Encryption, Identity-Based Trace and Revoke Schemes, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)