-
1
-
-
33746332056
-
Identity-Based Encryption Gone Wild
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006 Springer, Heidelberg
-
Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-Based Encryption Gone Wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 300-311. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 300-311
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.W.3
Malone-Lee, J.4
Neven, G.5
Smart, N.P.6
-
2
-
-
38049020476
-
Identity-Based Traitor Tracing
-
Okamoto, T., Wang, X. (eds.) PKC 2007 Springer, Heidelberg
-
Abdalla, M., Dent, A.W., Malone-Lee, J., Neven, G., Phan, D.H., Smart, N.P.: Identity-Based Traitor Tracing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 361-376. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 361-376
-
-
Abdalla, M.1
Dent, A.W.2
Malone-Lee, J.3
Neven, G.4
Phan, D.H.5
Smart, N.P.6
-
3
-
-
54249104590
-
Efficient Traitor Tracing from Collusion Secure Codes
-
Safavi-Naini, R. (ed.) ICITS 2008 Springer, Heidelberg
-
Billet, O., Phan, D.H.: Efficient Traitor Tracing from Collusion Secure Codes. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 171-182. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5155
, pp. 171-182
-
-
Billet, O.1
Phan, D.H.2
-
4
-
-
67650652430
-
Traitors Collaborating in Public: Pirates 2.0
-
Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
-
Billet, O., Phan, D.H.: Traitors Collaborating in Public: Pirates 2.0. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 189-205. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 189-205
-
-
Billet, O.1
Phan, D.H.2
-
5
-
-
24944562007
-
Hierarchical Identity Based Encryption with Constant Size Ciphertext
-
Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
6
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
33745166648
-
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
-
Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
70349289282
-
Traitor tracing with constant size ciphertext
-
Ning, P., Syverson, P.F., Jha, S. (eds.) ACM
-
Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM CCS 2008, pp. 501-510. ACM (2008)
-
(2008)
ACM CCS 2008
, pp. 501-510
-
-
Boneh, D.1
Naor, M.2
-
9
-
-
33746104815
-
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
-
Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
-
Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
10
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
11
-
-
34547269833
-
A fully collusion resistant broadcast, trace, and revoke system
-
Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM
-
Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM CCS 2006, pp. 211-220. ACM (2006)
-
(2006)
ACM CCS 2006
, pp. 211-220
-
-
Boneh, D.1
Waters, B.2
-
12
-
-
24944511263
-
Public Traceability in Traitor Tracing Schemes
-
Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
-
Chabanne, H., Phan, D.H., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 542-558
-
-
Chabanne, H.1
Phan, D.H.2
Pointcheval, D.3
-
13
-
-
84985922619
-
Tracing Traitors
-
Desmedt, Y.G. (ed.) CRYPTO 1994 Springer, Heidelberg
-
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
14
-
-
38149117029
-
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
-
Kurosawa, K. (ed.) ASIACRYPT 2007 Springer, Heidelberg
-
Delerablée, C.: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 200-215
-
-
Delerablée, C.1
-
15
-
-
38149109883
-
Traitor Tracing with Optimal Transmission Rate
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007 Springer, Heidelberg
-
Fazio, N., Nicolosi, A., Phan, D.H.: Traitor Tracing with Optimal Transmission Rate. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 71-88. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 71-88
-
-
Fazio, N.1
Nicolosi, A.2
Phan, D.H.3
-
16
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Wiener, M. (ed.) CRYPTO 1999 Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
17
-
-
78650009814
-
Building efficient fully collusion-resilient traitor tracing and revocation schemes
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
-
Garg, S., Kumarasubramanian, A., Sahai, A., Waters, B.: Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 121-130. ACM (2010)
-
(2010)
ACM CCS 2010
, pp. 121-130
-
-
Garg, S.1
Kumarasubramanian, A.2
Sahai, A.3
Waters, B.4
-
18
-
-
33746062799
-
Practical Identity-Based Encryption Without Random Oracles
-
Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
-
Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
19
-
-
50049123113
-
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007 Springer, Heidelberg
-
Guo, F., Mu, Y., Chen, Z.: Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 392-406. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 392-406
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
20
-
-
54249167139
-
Multi-Identity Single-Key Decryption without Random Oracles
-
Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007 Springer, Heidelberg
-
Guo, F., Mu, Y., Chen, Z., Xu, L.: Multi-Identity Single-Key Decryption without Random Oracles. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 384-398. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4990
, pp. 384-398
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
Xu, L.4
-
21
-
-
84959054452
-
On Crafty Pirates and Foxy Tracers
-
Sander, T. (ed.) DRM 2001 Springer, Heidelberg
-
Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2320
, pp. 22-39
-
-
Kiayias, A.1
Yung, M.2
-
22
-
-
35248831207
-
Breaking and Repairing Asymmetric Public-Key Traitor Tracing
-
Feigenbaum, J. (ed.) DRM 2002 Springer, Heidelberg
-
Kiayias, A., Yung, M.: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 32-50. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2696
, pp. 32-50
-
-
Kiayias, A.1
Yung, M.2
-
23
-
-
84947273176
-
Traitor Tracing with Constant Transmission Rate
-
Knudsen, L.R. (ed.) EUROCRYPT 2002 Springer, Heidelberg
-
Kiayias, A., Yung,M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
24
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Frankel, Y. (ed.) FC 2000 Springer, Heidelberg
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
25
-
-
84954420982
-
Trials of Traced Traitors
-
Anderson, R. (ed.) IH 1996 Springer, Heidelberg
-
Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 49-64. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
26
-
-
84887285849
-
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
-
Nguyên, P.Q. (ed.) VIETCRYPT 2006 Springer, Heidelberg
-
Phan, D.H.: Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 354-365. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 354-365
-
-
Phan, D.H.1
-
27
-
-
33746370427
-
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006 Springer, Heidelberg
-
Phan, D.H., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 264-275. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 264-275
-
-
Phan, D.H.1
Safavi-Naini, R.2
Tonien, D.3
-
30
-
-
0038447029
-
Optimal probabilistic fingerprint codes
-
ACM
-
Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116-125. ACM (2003)
-
(2003)
STOC 2003
, pp. 116-125
-
-
Tardos, G.1
-
31
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
-
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|