Codes Based Tracing and Revoking Scheme with Constant Ciphertext. Zhao, X. & Li, H. In Takagi, T., Wang, G., Qin, Z., Jiang, S., & Yu, Y., editors, Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, volume 7496, of Lecture Notes in Computer Science, pages 318–335, 2012. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/provsec/ZhaoL12,
author = {Xingwen Zhao and
Hui Li},
editor = {Tsuyoshi Takagi and
Guilin Wang and
Zhiguang Qin and
Shaoquan Jiang and
Yong Yu},
title = {Codes Based Tracing and Revoking Scheme with Constant Ciphertext},
booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
China, September 26-28, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7496},
pages = {318--335},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-33272-2\_21},
doi = {10.1007/978-3-642-33272-2\_21},
timestamp = {Tue, 14 May 2019 10:00:45 +0200},
biburl = {https://dblp.org/rec/conf/provsec/ZhaoL12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"7JW9TcdnSvZ7YSiBY","bibbaseid":"zhao-li-codesbasedtracingandrevokingschemewithconstantciphertext-2012","author_short":["Zhao, X.","Li, H."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Xingwen"],"propositions":[],"lastnames":["Zhao"],"suffixes":[]},{"firstnames":["Hui"],"propositions":[],"lastnames":["Li"],"suffixes":[]}],"editor":[{"firstnames":["Tsuyoshi"],"propositions":[],"lastnames":["Takagi"],"suffixes":[]},{"firstnames":["Guilin"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Zhiguang"],"propositions":[],"lastnames":["Qin"],"suffixes":[]},{"firstnames":["Shaoquan"],"propositions":[],"lastnames":["Jiang"],"suffixes":[]},{"firstnames":["Yong"],"propositions":[],"lastnames":["Yu"],"suffixes":[]}],"title":"Codes Based Tracing and Revoking Scheme with Constant Ciphertext","booktitle":"Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings","series":"Lecture Notes in Computer Science","volume":"7496","pages":"318–335","publisher":"Springer","year":"2012","url":"https://doi.org/10.1007/978-3-642-33272-2_21","doi":"10.1007/978-3-642-33272-2_21","timestamp":"Tue, 14 May 2019 10:00:45 +0200","biburl":"https://dblp.org/rec/conf/provsec/ZhaoL12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/provsec/ZhaoL12,\n author = {Xingwen Zhao and\n Hui Li},\n editor = {Tsuyoshi Takagi and\n Guilin Wang and\n Zhiguang Qin and\n Shaoquan Jiang and\n Yong Yu},\n title = {Codes Based Tracing and Revoking Scheme with Constant Ciphertext},\n booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,\n China, September 26-28, 2012. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7496},\n pages = {318--335},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-33272-2\\_21},\n doi = {10.1007/978-3-642-33272-2\\_21},\n timestamp = {Tue, 14 May 2019 10:00:45 +0200},\n biburl = {https://dblp.org/rec/conf/provsec/ZhaoL12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Zhao, X.","Li, H."],"editor_short":["Takagi, T.","Wang, G.","Qin, Z.","Jiang, S.","Yu, Y."],"key":"DBLP:conf/provsec/ZhaoL12","id":"DBLP:conf/provsec/ZhaoL12","bibbaseid":"zhao-li-codesbasedtracingandrevokingschemewithconstantciphertext-2012","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-33272-2_21"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/l/HuiLi6.bib","dataSources":["cJM3WsWa9JXXBYQLZ"],"keywords":[],"search_terms":["codes","based","tracing","revoking","scheme","constant","ciphertext","zhao","li"],"title":"Codes Based Tracing and Revoking Scheme with Constant Ciphertext","year":2012}