Anonymous trace and revoke
From MaRDI portal
Publication:2349640
DOI10.1016/j.cam.2013.10.019zbMath1338.94056OpenAlexW2081810838MaRDI QIDQ2349640
Ali Aydın Selçuk, Murat Ak, Serdar Pehlivanoglu
Publication date: 17 June 2015
Published in: Journal of Computational and Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cam.2013.10.019
privacybroadcast encryptionanonymitydigital rights managementdigital content distributiontrace and revoke
Related Items (3)
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption ⋮ Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security ⋮ Arrangements of Pseudocircles: Triangles and Drawings
Cites Work
- Unnamed Item
- Unnamed Item
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Improving the Round Complexity of Traitor Tracing Schemes
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Collusion-secure fingerprinting for digital data
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
This page was built for publication: Anonymous trace and revoke