Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
DOI10.1007/978-3-030-42921-8_21zbMATH Open1500.94042OpenAlexW3014111303MaRDI QIDQ5040409FDOQ5040409
Authors: Mriganka Mandal, Ratna Dutta
Publication date: 14 October 2022
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-42921-8_21
Recommendations
- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- Efficient revocable identity-based encryption with short public parameters
- An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Anonymous Lattice Identity-Based Encryption with Traceable Identities
- scientific article; zbMATH DE number 1759344
- Scalable public-key tracing and revoking
- Scalable public-key tracing and revoking
identity-based encryptionbroadcast encryptionanonymity and privacyfraud detection and revocationpublic-key tracingTardos fingerprinting code
Cites Work
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Public key broadcast encryption for stateless receivers
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Efficient Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
- Optimal probabilistic fingerprint codes
- Anonymous traitor tracing: how to embed arbitrary information in a key
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Efficient adaptively secure public-key trace and revoke from subset cover using Déjà Q framework
- Still wrong use of pairings in cryptography
- Anonymous trace and revoke
- Public-key revocation and tracing schemes with subset difference methods revisited
Cited In (3)
This page was built for publication: Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5040409)