Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311554
DOI10.1007/B99099zbMATH Open1104.94021OpenAlexW2477011922MaRDI QIDQ5311554FDOQ5311554
Authors: Jonathan Z. Sun, Roberto Tamassia, Michael T. Goodrich
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Recommendations
- Information Security
- scientific article; zbMATH DE number 1759651
- scientific article; zbMATH DE number 1759344
- Information Security and Cryptology - ICISC 2003
- Information and Communications Security
- scientific article; zbMATH DE number 2043336
- Quasi-Efficient Revocation of Group Signatures
- A Revocation Scheme with Minimal Storage at Receivers
- Information Security and Privacy
- Efficient Group Signature with Forward Secure Revocation
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cited In (30)
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
- Complete tree subset difference broadcast encryption scheme and its analysis
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Approximately optimal trees for group key management with batch updates
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Optimal subset-difference broadcast encryption with free riders
- Fully Distributed Broadcast Encryption
- Dynamic broadcast encryption scheme with revoking user
- Optimal tree structures for group key tree management considering insertion and deletion cost
- A multivariate identity-based broadcast encryption with applications to the Internet of Things
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Lower Bounds for Subset Cover Based Broadcast Encryption
- Ternary Subset Difference Method and Its Quantitative Analysis
- Efficient broadcast encryption with personalized messages
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Fully CCA2 secure identity based broadcast encryption without random oracles
- A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks
- Secure Key-Updating for Lazy Revocation
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Tree based symmetric key broadcast encryption
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Optimal key tree structure for two-user replacement and deletion problems
- Fighting Pirates 2.0
- Optimizing deletion cost for secure multicast key management
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311554)