Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Efficient Attribute-Based Encryption with Blackbox Traceability

    Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceab...

    Shengmin Xu, Guomin Yang, Yi Mu, **meng Liu in Provable Security (2018)

  2. No Access

    Chapter and Conference Paper

    Escrowed Deniable Identification Schemes

    Generally, the goal of identification schemes is to provide security assurance against impersonation attacks. Identification schemes based on zero knowledge protocols have more advantages, for example, deniabi...

    Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu in Security Technology (2009)