Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing
-
Published:2024-08
Issue:
Volume:84
Page:103803
-
ISSN:2214-2126
-
Container-title:Journal of Information Security and Applications
-
language:en
-
Short-container-title:Journal of Information Security and Applications
Author:
Liu ShuanggenORCID,
Hu Yingzi,
Wang Xu An,
Liu Xukai,
Yin Yuqing,
Wang TengORCID
Reference41 articles.
1. Tracing traitors;Chor,1994
2. Efficient trace and revoke schemes;Naor,2001
3. Traitor tracing revisited: New attackers, stronger security model and new construction;Wang;Cryptol ePrint Arch,2023
4. Boneh D, Waters B. A fully collusion resistant broadcast, trace, and revoke system. In: Proceedings of the 13th ACM conference on computer and communications security. 2006, p. 211–20.
5. Garg S, Kumarasubramanian A, Sahai A, Waters B. Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM conference on computer and communications security. 2010, p. 121–30.