Public-key revocation and tracing schemes with subset difference methods revisited
From MaRDI portal
Publication:5264480
DOI10.1007/978-3-319-11212-1_1zbMATH Open1443.94069OpenAlexW2106009114MaRDI QIDQ5264480FDOQ5264480
Authors:
Publication date: 27 July 2015
Published in: Computer Security - ESORICS 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-11212-1_1
Recommendations
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Public key broadcast encryption for stateless receivers
- scientific article; zbMATH DE number 2202214
- scientific article; zbMATH DE number 1942412
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Cited In (11)
- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- Information Security and Privacy
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Recipient revocable broadcast encryption schemes without random oracles
- Ternary Subset Difference Method and Its Quantitative Analysis
- Efficient revocable identity-based encryption via subset difference methods
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- Title not available (Why is that?)
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Arrangements of pseudocircles: triangles and drawings
- Scalable public-key tracing and revoking
This page was built for publication: Public-key revocation and tracing schemes with subset difference methods revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5264480)