Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4414701
DOI10.1007/3-540-36288-6_8zbMATH Open1033.94522OpenAlexW2164052311MaRDI QIDQ4414701FDOQ4414701
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_8
Recommendations
Cited In (32)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
- Complete tree subset difference broadcast encryption scheme and its analysis
- Efficient Broadcast Encryption with Personalized Messages
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Information Security and Privacy
- Identity-based broadcast encryption with shorter transmissions
- Traceable secret sharing and applications
- Efficient provably-secure hierarchical key assignment schemes
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- White box traitor tracing
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Title not available (Why is that?)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Pirate decoder for the broadcast encryption schemes from Crypto 2005
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
- Step-out group signatures
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Traceable secret sharing: strong security and efficient constructions
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- A note on the security of KHL scheme
- Black-box Trace\&Revoke codes
- Identity-Based Trace and Revoke Schemes
- Efficient Traitor Tracing from Collusion Secure Codes
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Security Notions for Broadcast Encryption
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Scalable public-key tracing and revoking
This page was built for publication: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414701)