-
2
-
-
35048887476
-
Short group signatures
-
M. K. Franklin, editor, CRYPTO. Springer
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
4
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO, pages 258-275, 2005.
-
(2005)
CRYPTO
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
5
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Second Theory of Cryptography Conference, TCC
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In Second Theory of Cryptography Conference, TCC, volume 3378 of LNCS, pages 325-341, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
6
-
-
84946840347
-
Short signatures from the weil pairing
-
London, UK. Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, pages 514-532, London, UK, 2001. Springer-Verlag.
-
(2001)
ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
EUROCRYPT 2006. Springer-Verlag
-
D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592. Springer-Verlag, 2006.
-
LNCS
, vol.4004
, Issue.2006
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
9
-
-
34547269833
-
A fully collusion resistant broadcast, trace, and revoke system
-
New York, NY, USA. ACM
-
D. Boneh and B. Waters. A fully collusion resistant broadcast, trace, and revoke system. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 211-220, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 211-220
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
24944511263
-
Public traceability in traitor tracing schemes
-
H. Chabanne, D. H. Phan, and D. Pointcheval. Public traceability in traitor tracing schemes. In EUROCRYPT, pages 542-558, 2005.
-
(2005)
EUROCRYPT
, pp. 542-558
-
-
Chabanne, H.1
Phan, D.H.2
Pointcheval, D.3
-
11
-
-
84985922619
-
Tracing traitors
-
London, UK. Springer-Verlag
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, pages 257-270, London, UK, 1994. Springer-Verlag.
-
(1994)
CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
12
-
-
35248899841
-
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
-
Y. Dodis and N. Fazio. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Public Key Cryptography, pages 100-115, 2003.
-
(2003)
Public Key Cryptography
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
14
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
C. Gentry and B. Waters. Adaptive security in broadcast encryption systems (with short ciphertexts). In EUROCRYPT, pages 171-188, 2009.
-
(2009)
EUROCRYPT
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
15
-
-
2642567536
-
Breaking and repairing asymmetric public-key traitor tracing
-
A. Kiayias and M. Yung. Breaking and repairing asymmetric public-key traitor tracing. In Digital Rights Management Workshop, pages 32-50, 2002.
-
(2002)
Digital Rights Management Workshop
, pp. 32-50
-
-
Kiayias, A.1
Yung, M.2
-
16
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
A. Kiayias and M. Yung. Traitor tracing with constant transmission rate. In EUROCRYPT, pages 450-465, 2002.
-
(2002)
EUROCRYPT
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
17
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In EUROCRYPT, pages 145-157, 1998.
-
(1998)
EUROCRYPT
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
19
-
-
0036475666
-
A new traitor tracing
-
S. Mitsunari, R. Sakai, and M. Kasahara. A new traitor tracing. In IEICE Trans. Fundamentals, pages E85-A(2):481? U484, 2002.
-
(2002)
IEICE Trans. Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
20
-
-
84959046713
-
Characterization of elliptic curve traces under fr-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano. Characterization of elliptic curve traces under fr-reduction. In ICISC, pages 90-108, 2000.
-
(2000)
ICISC
, pp. 90-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
21
-
-
84944319284
-
Efficient trace and revoke schemes
-
M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial Cryptography, pages 1-20, 2000.
-
(2000)
Financial Cryptography
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
22
-
-
84954420982
-
Trials of traced traitors
-
B. Pfitzmann. Trials of traced traitors. In Information Hiding, pages 49-64, 1996.
-
(1996)
Information Hiding
, pp. 49-64
-
-
Pfitzmann, B.1
-
24
-
-
18844409796
-
New traitor tracing schemes using bilinear map
-
New York, NY, USA. ACM
-
V. D. Tô, R. Safavi-Naini, and F. Zhang. New traitor tracing schemes using bilinear map. In DRM '03: Proceedings of the 3rd ACM workshop on Digital rights management, pages 67-76, New York, NY, USA, 2003. ACM.
-
(2003)
DRM '03: Proceedings of the 3rd ACM Workshop on Digital Rights Management
, pp. 67-76
-
-
Tô, V.D.1
Safavi-Naini, R.2
Zhang, F.3
-
25
-
-
84937577268
-
Efficient asymmetric public-key traitor tracing without trusted agents
-
Y. Watanabe, G. Hanaoka, and H. Imai. Efficient asymmetric public-key traitor tracing without trusted agents. In CT-RSA, pages 392-407, 2001.
-
(2001)
CT-RSA
, pp. 392-407
-
-
Watanabe, Y.1
Hanaoka, G.2
Imai, H.3
-
26
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
B. Waters. Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In CRYPTO, pages 619-636, 2009.
-
(2009)
CRYPTO
, pp. 619-636
-
-
Waters, B.1
|