Efficient attribute-based encryption with blackbox traceability

Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than...

全面介紹

Saved in:
書目詳細資料
Main Authors: XU, Shengmin, YANG, Guomin, MU, Yi, LIU, Ximeng
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2018
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/5209
https://ink.library.smu.edu.sg/context/sis_research/article/6212/viewcontent/Untitled_3.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English

相似書籍