scientific article; zbMATH DE number 1759344

From MaRDI portal
Publication:4536284

zbMath0999.94522MaRDI QIDQ4536284

Benny Pinkas, Moni Naor

Publication date: 28 November 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Traceable secret sharing and applications, White box traitor tracing, Efficient revocable identity-based encryption via subset difference methods, Black-box Trace\&Revoke codes, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Hardness of \(k\)-LWE and applications in traitor tracing, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Functional encryption with secure key leasing, Attribute-based encryption schemes with constant-size ciphertexts, Generic construction of trace-and-revoke inner product functional encryption, Complementary set encryption for privacy-preserving data consolidation, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Authenticated public key broadcast encryption scheme secure against insiders' attack, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, A note on the security of KHL scheme, Fighting Pirates 2.0, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Efficient Broadcast Encryption with Personalized Messages, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Defending against the Pirate Evolution Attack, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Fully Distributed Broadcast Encryption, Identity-Based Trace and Revoke Schemes, Conjunctive Broadcast and Attribute-Based Encryption, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption, Efficient Traitor Tracing from Collusion Secure Codes, A public-key traitor tracing scheme with revocation using dynamic shares, Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing