Sciweavers

Share
1 search results - page 1 / 1
» Adaptive Witness Encryption and Asymmetric Password-Based Cr...
Sort
View
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
10 years 7 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
books