Efficient attribute-based encryption with blackbox traceability
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability which can trace decryption keys embedded in a decryption blackbox/device rather than...
Saved in:
Main Authors: | XU, Shengmin, YANG, Guomin, MU, Yi, LIU, Ximeng |
---|---|
格式: | text |
語言: | English |
出版: |
Institutional Knowledge at Singapore Management University
2018
|
主題: | |
在線閱讀: | https://ink.library.smu.edu.sg/sis_research/5209 https://ink.library.smu.edu.sg/context/sis_research/article/6212/viewcontent/Untitled_3.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Singapore Management University |
語言: | English |
相似書籍
-
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
由: XU, Shengmin, et al.
出版: (2020) -
Generic construction of ElGamal-type attribute-based encryption schemes with revocability and dual-policy
由: XU, Shengmin, et al.
出版: (2019) -
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
由: XU, Shengmin, et al.
出版: (2019) -
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
由: ZHANG, Kai, et al.
出版: (2017) -
Online/Offline traceable attribute-based encryption [in Chinese]
由: ZHANG, Kai, et al.
出版: (2018)