-
1
-
-
84979291225
-
Broadcast encryption
-
LNCS
-
Amos Fiat, Moni Naor, Broadcast Encryption, CRYPTO 1993, LNCS, vol. 773, pp.480-491, 1994.
-
(1994)
CRYPTO 1993
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS
-
Dalit Naor, Moni Naor, Jeffrey Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, LNCS, vol. 2139, pp. 41-62, 2001.
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
3
-
-
84937435227
-
The LSD broadcast encryption scheme
-
LNCS
-
Dani Halevy, Adi Shamir, The LSD Broadcast Encryption Scheme, CRYPTO 2002, LNCS, vol. 2442, pp. 47-60, 2002.
-
(2002)
CRYPTO 2002
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
4
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
LNCS
-
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Efficient Tree-based Revocation in Groups of Low-state Devices, CRYPTO 2004, LNCS, vol. 3152, pp. 511-527, 2004.
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
5
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
3621 LNCS Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Dan Boneh, Craig Gentry, Brent Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, CRYPTO 2005, LNCS, vol. 3621, pp. 258-275, 2005. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
57949110628
-
Identity-based broadcast encryption with constant-size ciphertexts and private keys
-
LNCS
-
Cécile Delerabĺee, Identity-based Broadcast Encryption with Constant-size Ciphertexts and Private Keys, ASIACRYPT 2007, LNCS, vol. 4833, pp. 200-215, 2007.
-
(2007)
ASIACRYPT 2007
, vol.4833
, pp. 200-215
-
-
Delerabĺee, C.1
-
8
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS
-
Adi Shamir, Identity-based Cryptosystems and Signature Schemes, CRYPTO 1984, LNCS, vol. 196, pp. 47-53, 1985.
-
(1985)
CRYPTO 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
9
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
LNCS
-
Dan Boneh, Matt Franklin, Identity-based Encryption from the Weil Pairing, CRYPTO 2001, LNCS, vol. 2139, pp. 213-229, 2001.
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
33746062799
-
Practical Identity-based Encryption without Random Oracles
-
LNCS
-
Craig Gentry, Practical Identity-based Encryption without Random Oracles, EUROCRYPT 2006, LNCS, vol. 4004, pp. 445-464, 2006.
-
(2006)
EUROCRYPT 2006
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
11
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
LNCS
-
Adam Barth, Dan Boneh, Brent Waters, Privacy in Encrypted Content Distribution Using Private Broadcast Encryption, FC 2006. LNCS, vol.4107, pp.52-64, 2006.
-
(2006)
FC 2006
, vol.4107
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
12
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
LNCS
-
Dan Boneh, Xavier Boyen, Eu-Jin Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, LNCS, vol. 3494, pp. 440-456, 2005.
-
(2005)
EUROCRYPT 2005
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
|