Pages that link to "Item:Q3524122"
From MaRDI portal
The following pages link to Privacy in Encrypted Content Distribution Using Private Broadcast Encryption (Q3524122):
Displaying 21 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Robust encryption (Q1753165) (← links)
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication (Q2149789) (← links)
- Multi-designated receiver signed public key encryption (Q2170065) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymous certificate-based broadcast encryption with constant decryption cost (Q2195299) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Anonymous protocols: notions and equivalence (Q2345446) (← links)
- Anonymous trace and revoke (Q2349640) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Secure and Efficient Construction of Broadcast Encryption with Dealership (Q2953866) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption (Q5040409) (← links)
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking (Q5056017) (← links)
- Post-quantum anonymity of Kyber (Q6091126) (← links)
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication (Q6101280) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)