2012
DOI: 10.1016/j.cose.2011.11.002
|View full text |Cite
|
Sign up to set email alerts
|

Tracing and revoking scheme for dynamic privileges against pirate rebroadcast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…Some schemes considered the situations where users belonged to different privileges. Adelsbach et al .…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Some schemes considered the situations where users belonged to different privileges. Adelsbach et al .…”
Section: Related Workmentioning
confidence: 99%
“…However, the storage cost in previous static schemes is dependent on the number of revoked users and the number of groups, and the storage cost in previous dynamic scheme is dependent on the number of groups, the number of revoked users, and the total number of users (described in Subsection 5.2 of ). The storage cost in our framework is dependent on the number of groups only, if the ciphertext length of the employed data sharing scheme is constant, as is the encryption scheme used in . Moreover, our framework allows directed‐acyclic‐graph‐structured privileges, whereas these works allow only line‐structured privileges, that is, one group in each privilege.…”
Section: Efficiency Evaluationmentioning
confidence: 99%
See 3 more Smart Citations