Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311554

DOI10.1007/b99099zbMath1104.94021OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311554

Roberto Tamassia, Jonathan Z. Sun, Michael T. Goodrich

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items

Implementing broadcast encryption scheme using bilinear map and group characteristicOptimal key tree structure for two-user replacement and deletion problemsA multivariate identity-based broadcast encryption with applications to the Internet of ThingsComplete tree subset difference broadcast encryption scheme and its analysisMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationAttribute-Based Broadcast Encryption Scheme Made EfficientLower Bounds for Subset Cover Based Broadcast EncryptionIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersA new threshold changeable secret sharing scheme based on the Chinese remainder theoremProvably secure threshold public-key encryption with adaptive security and short ciphertextsIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysOptimizing deletion cost for secure multicast key managementTree based symmetric key broadcast encryptionFighting Pirates 2.0Fully collusion-resistant traitor tracing scheme with shorter ciphertextsEfficient Broadcast Encryption with Personalized MessagesFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysFully CCA2 secure identity based broadcast encryption without random oraclesTernary Subset Difference Method and Its Quantitative AnalysisPublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeOptimal subset-difference broadcast encryption with free ridersApproximately optimal trees for group key management with batch updatesAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Anonymous Identity-Based Broadcast Encryption with Revocation for File SharingFully Distributed Broadcast EncryptionDynamic broadcast encryption scheme with revoking userOptimal tree structures for group key tree management considering insertion and deletion costA Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc NetworksSecure Key-Updating for Lazy Revocation




This page was built for publication: Advances in Cryptology – CRYPTO 2004