Sciweavers

78 search results - page 5 / 16
» Broadcast Encryption
Sort
View
149
Voted
CCS
2006
ACM
15 years 8 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
140
Voted
LATINCRYPT
2010
15 years 3 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
138
Voted
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
AFRICACRYPT
2008
Springer
15 years 11 months ago
Lower Bounds for Subset Cover Based Broadcast Encryption
Per Austrin, Gunnar Kreitz