Public-key revocation and tracing schemes with subset difference methods revisited
From MaRDI portal
Publication:5264480
Recommendations
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Public key broadcast encryption for stateless receivers
- scientific article; zbMATH DE number 2202214
- scientific article; zbMATH DE number 1942412
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Cited In (11)
- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- Information Security and Privacy
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Recipient revocable broadcast encryption schemes without random oracles
- Ternary Subset Difference Method and Its Quantitative Analysis
- Efficient revocable identity-based encryption via subset difference methods
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- Title not available (Why is no real title available?)
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Arrangements of pseudocircles: triangles and drawings
- Scalable public-key tracing and revoking
This page was built for publication: Public-key revocation and tracing schemes with subset difference methods revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5264480)