Sciweavers

23 search results - page 5 / 5
» Hierarchical Identity Based Encryption with Constant Size Ci...
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 2 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
104
Voted
ISPEC
2011
Springer
14 years 1 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
SACMAT
2004
ACM
15 years 3 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...