Login / Signup

Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.

MoonShik LeeDaegun MaMinJae Seo
Published in: ACNS (2009)
Keyphrases
  • ciphertext
  • standard model
  • public key encryption
  • relational databases
  • public key
  • proxy re encryption
  • encryption scheme
  • security model