搜索结果: 1-5 共查到“军队指挥学 Trace and Revoke”相关记录5条 . 查询时间(0.067 秒)
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
public-key cryptography traitor tracing, revocation
2019/8/30
A traitor tracing scheme is a multi-user public-key encryption scheme where each user in the system holds a decryption key that is associated with the user's identity. Using the public key, a content ...
We provide efficient constructions for trace-and-revoke systems with public traceability in the black-box confirmation model. Our constructions achieve adaptive security, are based on standard assumpt...
A generic view on trace-and-revoke broadcast encryption schemes
broadcast encryption revocation scheme
2014/3/5
At Eurocrypt 2011, Wee presented a generalization of threshold public key encryption, threshold signatures, and revocation schemes arising from threshold extractable hash proof systems. In particular,...
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Public Key Trace Revoke Scheme Secure Adaptive Chosen Ciphertext Attack
2009/4/9
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption
with the capability of traitor tracing. Specifically, (1) a trusted center publishes a single public key and ...
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Collusion Resistant Broadcast Trace Revoke System
2008/12/16
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is
sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems.These ABE-based con...