Pages that link to "Item:Q4414701"
From MaRDI portal
The following pages link to Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack (Q4414701):
Displayed 28 items.
- Black-box Trace\&Revoke codes (Q378263) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts (Q548093) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Efficient provably-secure hierarchical key assignment schemes (Q719310) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Complete tree subset difference broadcast encryption scheme and its analysis (Q1934221) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Traceable secret sharing and applications (Q2129017) (← links)
- White box traitor tracing (Q2139638) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- Pirate decoder for the broadcast encryption schemes from Crypto 2005 (Q2385401) (← links)
- Step-out group signatures (Q2390951) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Efficient Broadcast Encryption with Personalized Messages (Q4933223) (← links)
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Q5445465) (← links)
- Efficient Traitor Tracing from Collusion Secure Codes (Q5502800) (← links)
- Scalable public-key tracing and revoking (Q5917935) (← links)