Pages that link to "Item:Q3593119"
From MaRDI portal
The following pages link to Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119):
Displaying 45 items.
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts (Q548093) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- Using abelian varieties to improve pairing-based cryptography (Q1027984) (← links)
- Impossibility of order-revealing encryption in idealized models (Q1631321) (← links)
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings (Q2096502) (← links)
- A performance evaluation of pairing-based broadcast encryption systems (Q2096602) (← links)
- Traceable secret sharing and applications (Q2129017) (← links)
- White box traitor tracing (Q2139638) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- New approaches to traitor tracing with embedded identities (Q2175935) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- Research on quantum authentication methods for the secure access control among three elements of cloud computing (Q2400196) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method (Q2430983) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Efficient ciphertext-policy attribute-based encryption with blackbox traceability (Q2666748) (← links)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions (Q2692377) (← links)
- Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe (Q2794498) (← links)
- Order-Revealing Encryption and the Hardness of Private Learning (Q2796125) (← links)
- Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard (Q2805511) (← links)
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems (Q3005592) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Strong Hardness of Privacy from Weak Traitor Tracing (Q3179374) (← links)
- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts (Q3454597) (← links)
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems (Q3556625) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Defending against the Pirate Evolution Attack (Q3618672) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Traitors Collaborating in Public: Pirates 2.0 (Q3627435) (← links)
- The Complexity of Differential Privacy (Q5021135) (← links)
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption (Q5040409) (← links)
- Traceable PRFs: Full Collusion Resistance and Active Security (Q5087266) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Efficient Traitor Tracing from Collusion Secure Codes (Q5502800) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities (Q6122595) (← links)
- A survey on functional encryption (Q6163797) (← links)