-
1
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
A. Barth, D. Boneh, and B.Waters, "Privacy in encrypted content distribution using private broadcast encryption, " Proc. Financial Cryptography, LNCS 4107, pp. 52-64, 2006. (Pubitemid 44577277)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
2
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys, " Proc. CRYPTO 2005, LNCS, vol. 3621, pp. 258-275, 2005. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
3
-
-
38149117029
-
Identity-based broadcast encryption with cosntant size ciphertexts and private keys
-
C. Delerablee, "Identity-based broadcast encryption with cosntant size ciphertexts and private keys, " Proc. ASIACRYPT 2007, LNCS 4833, pp. 200-215, 2007.
-
(2007)
Proc. ASIACRYPT 2007, LNCS 4833
, pp. 200-215
-
-
Delerablee, C.1
-
4
-
-
84861593834
-
Privacy-preserving identity-based broadcast encryption
-
doi:10.1016/j.inffus.2011. 03.003
-
J. Hur, C. Park, and S. Hwang, "Privacy-preserving identity-based broadcast encryption, " Information Fusion, doi:10.1016/j.inffus.2011. 03.003, 2012.
-
(2012)
Information Fusion
-
-
Hur, J.1
Park, C.2
Hwang, S.3
-
5
-
-
14844326195
-
The LSD broadcast encryption scheme
-
D. Halevi and A. Shamir, "The LSD broadcast encryption scheme, " Proc. CRYPTO 2002, pp. 47-60, 2002.
-
(2002)
Proc. CRYPTO 2002
, pp. 47-60
-
-
Halevi, D.1
Shamir, A.2
-
6
-
-
33846452379
-
The Eta pairing revisited
-
DOI 10.1109/TIT.2006.881709
-
F. Hess, N.P. Smart, and F. Vercauteren, "The Eta pairing revisited, " IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4595-4602, 2006. (Pubitemid 46445294)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4595-4602
-
-
Hess, F.1
Smart, N.P.2
Vercauteren, F.3
-
7
-
-
38149092452
-
Pairing-based onion routing
-
A. Kate, G. Zaverucha, and I. Goldberg, "Pairing-based onion routing, " Proc. Privacy Enhancing Technologies Symposium 2007, LNCS 4776, pp. 95-112, 2007.
-
(2007)
Proc. Privacy Enhancing Technologies Symposium 2007, LNCS 4776
, pp. 95-112
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
9
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers, " CRYPTO 2001, pp. 41-62, 2001. (Pubitemid 33317907)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
|