Pages that link to "Item:Q5311554"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311554):
Displaying 30 items.
- Optimal key tree structure for two-user replacement and deletion problems (Q358638) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- Tree based symmetric key broadcast encryption (Q491159) (← links)
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts (Q548093) (← links)
- Optimal subset-difference broadcast encryption with free riders (Q730946) (← links)
- Optimizing deletion cost for secure multicast key management (Q935143) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Approximately optimal trees for group key management with batch updates (Q1007240) (← links)
- Optimal tree structures for group key tree management considering insertion and deletion cost (Q1029331) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Complete tree subset difference broadcast encryption scheme and its analysis (Q1934221) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem (Q2200703) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks (Q2864182) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Implementing broadcast encryption scheme using bilinear map and group characteristic (Q3443220) (← links)
- Attribute-Based Broadcast Encryption Scheme Made Efficient (Q3506391) (← links)
- Lower Bounds for Subset Cover Based Broadcast Encryption (Q3506392) (← links)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (Q3593119) (← links)
- Ternary Subset Difference Method and Its Quantitative Analysis (Q3605394) (← links)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) (Q3627434) (← links)
- Efficient Broadcast Encryption with Personalized Messages (Q4933223) (← links)
- Dynamic broadcast encryption scheme with revoking user (Q4981096) (← links)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys (Q5387100) (← links)
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Q5445465) (← links)
- Secure Key-Updating for Lazy Revocation (Q5862525) (← links)
- A multivariate identity-based broadcast encryption with applications to the Internet of Things (Q6047430) (← links)
- Anonymous attribute-based broadcast encryption with hidden multiple access structures (Q6564089) (← links)