Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4414701
DOI10.1007/3-540-36288-6_8zbMath1033.94522OpenAlexW2164052311MaRDI QIDQ4414701
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_8
Related Items
Traceable secret sharing and applications, White box traitor tracing, Pirate decoder for the broadcast encryption schemes from Crypto 2005, Step-out group signatures, Black-box Trace\&Revoke codes, Complete tree subset difference broadcast encryption scheme and its analysis, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Identity-based broadcast encryption with shorter transmissions, A note on the security of KHL scheme, Security Notions for Broadcast Encryption, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Efficient Broadcast Encryption with Personalized Messages, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, Efficient provably-secure hierarchical key assignment schemes, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Scalable public-key tracing and revoking, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Identity-Based Trace and Revoke Schemes, Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Efficient Traitor Tracing from Collusion Secure Codes