Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security
From MaRDI portal
Publication:5095928
DOI10.1007/978-3-030-93206-0_11zbMath1504.94169OpenAlexW4205606768MaRDI QIDQ5095928
Ramprasad Sarkar, Mriganka Mandal, Koji Nuida, Junbeom Hur
Publication date: 11 August 2022
Published in: Information Security Practice and Experience (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-93206-0_11
broadcast encryptionidentity-based encryptionanonymity and privacyfraud detection and revocationadaptive \textsf{IND-CCA} securitycollusion-secure codestype-3 bilinear map
Cites Work
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Anonymous trace and revoke
- Functional Encryption Without Obfuscation
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Optimal probabilistic fingerprint codes
This page was built for publication: Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security