Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311554
Recommendations
- Information Security
- scientific article; zbMATH DE number 1759651
- scientific article; zbMATH DE number 1759344
- Information Security and Cryptology - ICISC 2003
- Information and Communications Security
- scientific article; zbMATH DE number 2043336
- Quasi-Efficient Revocation of Group Signatures
- A Revocation Scheme with Minimal Storage at Receivers
- Information Security and Privacy
- Efficient Group Signature with Forward Secure Revocation
Cited in
(30)- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Tree based symmetric key broadcast encryption
- Lower Bounds for Subset Cover Based Broadcast Encryption
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Secure key-updating for lazy revocation
- A dynamic broadcast encryption scheme with revoking user
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Efficient broadcast encryption with personalized messages
- Fully distributed broadcast encryption
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Optimal key tree structure for two-user replacement and deletion problems
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Optimizing deletion cost for secure multicast key management
- Optimal tree structures for group key tree management considering insertion and deletion cost
- Optimal subset-difference broadcast encryption with free riders
- Complete tree subset difference broadcast encryption scheme and its analysis
- Anonymous identity-based broadcast encryption with revocation for file sharing
- Ternary Subset Difference Method and Its Quantitative Analysis
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Fighting Pirates 2.0
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- A multivariate identity-based broadcast encryption with applications to the Internet of Things
- A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks
- Approximately optimal trees for group key management with batch updates
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311554)