Login / Signup
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Yuji Watanabe
Goichiro Hanaoka
Hideki Imai
Published in:
CT-RSA (2001)
Keyphrases
</>
public key
provably secure
security analysis
multiagent systems
distributed environment
digital signature
image authentication
signature scheme
security model
authentication scheme
public key cryptography
blind signature scheme
public key infrastructure
proxy re encryption