Traitors Collaborating in Public: Pirates 2.0
From MaRDI portal
Publication:3627435
DOI10.1007/978-3-642-01001-9_11zbMath1239.94071OpenAlexW2140402836MaRDI QIDQ3627435
Olivier Billet, Duong Hieu Phan
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_11
Related Items (3)
Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Fighting Pirates 2.0 ⋮ Identity-Based Trace and Revoke Schemes
Cites Work
- On codes with the identifiable parent property
- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Public Traceability in Traitor Tracing Schemes
- Efficient Traitor Tracing from Collusion Secure Codes
- Optimal probabilistic fingerprint codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Traitors Collaborating in Public: Pirates 2.0