New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
From MaRDI portal
Publication:2096502
DOI10.1007/978-3-030-56784-2_22zbMath1504.94199OpenAlexW3048628423MaRDI QIDQ2096502
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_22
Related Items (7)
Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ White box traitor tracing ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ A performance evaluation of pairing-based broadcast encryption systems
Cites Work
- Attribute-based encryption schemes with constant-size ciphertexts
- Traitor-tracing from LWE made simple and attribute-based
- Hardness of non-interactive differential privacy from one-way functions
- Risky traitor tracing and new differential privacy negative results
- Identity-based encryption from the Diffie-Hellman assumption
- Barriers to black-box constructions of traitor tracing systems
- Optimal broadcast encryption from pairings and LWE
- New approaches to traitor tracing with embedded identities
- Collusion resistant broadcast and trace from positional witness encryption
- Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Hardness of k-LWE and Applications in Traitor Tracing
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Strong Hardness of Privacy from Weak Traitor Tracing
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Collusion resistant traitor tracing from learning with errors
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Identity-Based Traitor Tracing
- Optimal probabilistic fingerprint codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings