Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311554
DOI10.1007/b99099zbMath1104.94021OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311554
Roberto Tamassia, Jonathan Z. Sun, Michael T. Goodrich
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items
Implementing broadcast encryption scheme using bilinear map and group characteristic ⋮ Optimal key tree structure for two-user replacement and deletion problems ⋮ A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Attribute-Based Broadcast Encryption Scheme Made Efficient ⋮ Lower Bounds for Subset Cover Based Broadcast Encryption ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ A new threshold changeable secret sharing scheme based on the Chinese remainder theorem ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ Optimizing deletion cost for secure multicast key management ⋮ Tree based symmetric key broadcast encryption ⋮ Fighting Pirates 2.0 ⋮ Fully collusion-resistant traitor tracing scheme with shorter ciphertexts ⋮ Efficient Broadcast Encryption with Personalized Messages ⋮ Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Ternary Subset Difference Method and Its Quantitative Analysis ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ Optimal subset-difference broadcast encryption with free riders ⋮ Approximately optimal trees for group key management with batch updates ⋮ Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) ⋮ Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing ⋮ Fully Distributed Broadcast Encryption ⋮ Dynamic broadcast encryption scheme with revoking user ⋮ Optimal tree structures for group key tree management considering insertion and deletion cost ⋮ A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks ⋮ Secure Key-Updating for Lazy Revocation
This page was built for publication: Advances in Cryptology – CRYPTO 2004