Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4414701
Recommendations
Cited in
(37)- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Efficient adaptively secure public-key trace and revoke from subset cover using Déjà Q framework
- Scalable public-key tracing and revoking
- Complete tree subset difference broadcast encryption scheme and its analysis
- A generic view on trace-and-revoke broadcast encryption schemes
- An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack
- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Identity-based broadcast encryption with shorter transmissions
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Information Security and Privacy
- Fully secure functional encryption for inner products, from standard assumptions
- Traceable secret sharing and applications
- Key-leakage resilient revoke scheme resisting pirates 2.0 in bounded leakage model
- Efficient provably-secure hierarchical key assignment schemes
- White box traitor tracing
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- scientific article; zbMATH DE number 2202214 (Why is no real title available?)
- Efficient broadcast encryption with personalized messages
- Pirate decoder for the broadcast encryption schemes from Crypto 2005
- Identity-based trace and revoke schemes
- Security notions for broadcast encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Step-out group signatures
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Traceable secret sharing: strong security and efficient constructions
- A note on the security of KHL scheme
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Black-box Trace\&Revoke codes
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Efficient Traitor Tracing from Collusion Secure Codes
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
This page was built for publication: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414701)