-
1
-
-
84858918037
-
Property-based broadcast encryption for multi-level security policies
-
D. Won, S. Kim, Vol. 3935 of Lecture Notes in Computer Science Springer
-
A. Adelsbach, U. Huber, and A.-R. Sadeghi Property-based broadcast encryption for multi-level security policies D. Won, S. Kim, ICISC Vol. 3935 of Lecture Notes in Computer Science 2005 Springer 15 31
-
(2005)
ICISC
, pp. 15-31
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
2
-
-
0344196671
-
Sequential key derivation patterns for broadcast encryption and key predistribution schemes
-
N. Attrapadung, K. Kobara, and H. Imai Sequential key derivation patterns for broadcast encryption and key predistribution schemes ASIACRYPT 2003 374 391
-
(2003)
ASIACRYPT
, pp. 374-391
-
-
Attrapadung, N.1
Kobara, K.2
Imai, H.3
-
3
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
D. Boneh, and M.K. Franklin An efficient public key traitor tracing scheme CRYPTO 1999 338 353
-
(1999)
CRYPTO
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
34547269833
-
A fully collusion resistant broadcast, trace, and revoke system
-
DOI 10.1145/1180405.1180432, 1180432, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
D. Boneh, and B. Waters A fully collusion resistant broadcast, trace, and revoke system ACM conference on computer and communications security 2006 211 220 (Pubitemid 47131370)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 211-220
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée Identity-based broadcast encryption with constant size ciphertexts and private keys ASIACRYPT 2007 200 215
-
(2007)
ASIACRYPT
, pp. 200-215
-
-
Delerablée, C.1
-
8
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
C. Delerablée, P. Paillier, and D. Pointcheval Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys Pairing 2007 39 59
-
(2007)
Pairing
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
9
-
-
0001293053
-
Broadcast encryption
-
D.R. Stinson, Vol. 773 of Lecture Notes in Computer Science Springer
-
A. Fiat, and M. Naor Broadcast encryption D.R. Stinson, CRYPTO Vol. 773 of Lecture Notes in Computer Science 1993 Springer 480 491
-
(1993)
CRYPTO
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
10
-
-
84957076207
-
Dynamic traitor tracing
-
A. Fiat, and T. Tassa Dynamic traitor tracing CRYPTO 1999 354 371
-
(1999)
CRYPTO
, pp. 354-371
-
-
Fiat, A.1
Tassa, T.2
-
11
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
Vol. 5479 of Lecture Notes in Computer Science Springer-Verlag
-
C. Gentry, and B. Waters Adaptive security in broadcast encryption systems (with short ciphertexts) EUROCRYPT 2009 Vol. 5479 of Lecture Notes in Computer Science 2009 Springer-Verlag 171 188
-
(2009)
EUROCRYPT 2009
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
12
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
M.T. Goodrich, J.Z. Sun, and R. Tamassia Efficient tree-based revocation in groups of low-state devices CRYPTO 2004 511 527
-
(2004)
CRYPTO
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
13
-
-
84937435227
-
The lsd broadcast encryption scheme
-
M. Yung, Vol. 2442 of Lecture Notes in Computer Science Springer
-
D. Halevy, and A. Shamir The lsd broadcast encryption scheme M. Yung, CRYPTO Vol. 2442 of Lecture Notes in Computer Science 2002 Springer 47 60
-
(2002)
CRYPTO
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
14
-
-
79957880317
-
Broadcast encryption for differently privileged
-
D. Gritzalis, J. Lopez, Vol. 297 of IFIP Springer
-
H. Jin, and J. Lotspiech Broadcast encryption for differently privileged D. Gritzalis, J. Lopez, SEC Vol. 297 of IFIP 2009 Springer 283 293
-
(2009)
SEC
, pp. 283-293
-
-
Jin, H.1
Lotspiech, J.2
-
17
-
-
38049163807
-
Pirate evolution: How to make the most of your traitor keys
-
A. Kiayias, and S. Pehlivanoglu Pirate evolution: how to make the most of your traitor keys CRYPTO 2007 448 465
-
(2007)
CRYPTO
, pp. 448-465
-
-
Kiayias, A.1
Pehlivanoglu, S.2
-
18
-
-
68849127956
-
Tracing and revoking pirate rebroadcasts
-
M. Abdalla, D. Pointcheval, P.-A. Fouque, D. Vergnaud, Vol. 5536 of Lecture Notes in Computer Science
-
A. Kiayias, and S. Pehlivanoglu Tracing and revoking pirate rebroadcasts M. Abdalla, D. Pointcheval, P.-A. Fouque, D. Vergnaud, ACNS Vol. 5536 of Lecture Notes in Computer Science 2009 253 271
-
(2009)
ACNS
, pp. 253-271
-
-
Kiayias, A.1
Pehlivanoglu, S.2
-
19
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
A. Kiayias, and M. Yung Traitor tracing with constant transmission rate EUROCRYPT 2002 450 465
-
(2002)
EUROCRYPT
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
20
-
-
58449125766
-
Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption
-
M. Kusakawa, H. Hiwatari, T. Asano, and S. Matsuda Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption CANS 2008 31 48
-
(2008)
CANS
, pp. 31-48
-
-
Kusakawa, M.1
Hiwatari, H.2
Asano, T.3
Matsuda, S.4
-
22
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor, and J. Lotspiech Revocation and tracing schemes for stateless receivers J. Kilian, CRYPTO Vol. 2139 of Lecture Notes in Computer Science 2001 Springer 41 62 (Pubitemid 33317907)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
23
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Financial Cryptography
-
M. Naor, and B. Pinkas Efficient trace and revoke schemes Financial cryptography 2000 1 20 (Pubitemid 33359593)
-
(2001)
Lecture Notes in Computer Science
, Issue.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
62649173578
-
Fully cca2 secure identity based broadcast encryption without random oracles
-
Y. Ren, and D. Gu Fully cca2 secure identity based broadcast encryption without random oracles Inf Process Lett 109 11 2009 527 533
-
(2009)
Inf Process Lett
, vol.109
, Issue.11
, pp. 527-533
-
-
Ren, Y.1
Gu, D.2
-
25
-
-
84974601983
-
Sequential traitor tracing
-
R. Safavi-Naini, and Y. Wang Sequential traitor tracing CRYPTO 2000 316 332
-
(2000)
CRYPTO
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
26
-
-
38149030386
-
-
Technical reports, Cryptology ePrint Archive, Report 2007/217
-
R. Sakai, and J. Furukawa Identity-based broadcast encryption Technical reports, Cryptology ePrint Archive, Report 2007/217 2007 http://eprint.iacr.org/ 2007/217
-
(2007)
Identity-based Broadcast Encryption
-
-
Sakai, R.1
Furukawa, J.2
-
27
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A.T. Sherman, and D.A. McGrew Key establishment in large dynamic groups using one-way function trees IEEE Trans Software Eng 29 5 2003 444 458
-
(2003)
IEEE Trans Software Eng
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
|