The following pages link to (Q4536284):
Displaying 33 items.
- Black-box Trace\&Revoke codes (Q378263) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Authenticated public key broadcast encryption scheme secure against insiders' attack (Q445379) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts (Q548093) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- Traceable secret sharing and applications (Q2129017) (← links)
- White box traitor tracing (Q2139638) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- A public-key traitor tracing scheme with revocation using dynamic shares (Q2572960) (← links)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions (Q2692377) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems (Q3005592) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Conjunctive Broadcast and Attribute-Based Encryption (Q3392916) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- Defending against the Pirate Evolution Attack (Q3618672) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Efficient Broadcast Encryption with Personalized Messages (Q4933223) (← links)
- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing (Q5030210) (← links)
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Q5445465) (← links)
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption (Q5502750) (← links)
- Efficient Traitor Tracing from Collusion Secure Codes (Q5502800) (← links)
- Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities (Q6122595) (← links)
- Complementary set encryption for privacy-preserving data consolidation (Q6190042) (← links)
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application (Q6204161) (← links)