Sciweavers

78 search results - page 5 / 16
» Broadcast Encryption
Sort
View
CCS
2006
ACM
15 years 3 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
LATINCRYPT
2010
14 years 10 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
15 years 5 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
AFRICACRYPT
2008
Springer
15 years 6 months ago
Lower Bounds for Subset Cover Based Broadcast Encryption
Per Austrin, Gunnar Kreitz