Traitor Tracing with Optimal Transmission Rate
From MaRDI portal
Publication:3507866
DOI10.1007/978-3-540-75496-1_5zbMath1138.68408OpenAlexW1510996546MaRDI QIDQ3507866
Duong Hieu Phan, Nelly Fazio, Antonio R. Nicolosi
Publication date: 24 June 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-75496-1_5
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (7)
New approaches to traitor tracing with embedded identities ⋮ Black-box Trace\&Revoke codes ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: Traitor Tracing with Optimal Transmission Rate