Scalable public-key tracing and revoking
From MaRDI portal
Publication:5917935
DOI10.1007/S00446-004-0120-5zbMath1264.94108OpenAlexW2027145511MaRDI QIDQ5917935
Nelly Fazio, Aggelos Kiayias, Yevgeniy Dodis, Mordechai M. Yung
Publication date: 7 June 2013
Published in: Distributed Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00446-004-0120-5
Related Items (1)
Cites Work
- Public Key Broadcast Encryption for Stateless Receivers
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Improved decoding of Reed-Solomon and algebraic-geometry codes
- How to withstand mobile virus attacks (extended abstract)
- Scalable public-key tracing and revoking
- Dynamic traitor tracing
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Scalable public-key tracing and revoking