Login / Signup
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.
MoonShik Lee
Daegun Ma
MinJae Seo
Published in:
ACNS (2009)
Keyphrases
</>
ciphertext
standard model
public key encryption
relational databases
public key
proxy re encryption
encryption scheme
security model