Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1418304 - MaRDI portal

scientific article; zbMATH DE number 1418304

From MaRDI portal
Publication:4941864

zbMath0972.94029MaRDI QIDQ4941864

Dan Boneh, Matthew Franklin

Publication date: 19 July 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (30)

Traceable secret sharing and applicationsWhite box traitor tracingBlending FHE-NTRU Keys – The Excalibur PropertyPirate decoder for the broadcast encryption schemes from Crypto 2005Separation and WitnessesNew approaches to traitor tracing with embedded identitiesBlack-box Trace\&Revoke codesComplete tree subset difference broadcast encryption scheme and its analysisHardness of \(k\)-LWE and applications in traitor tracingIndistinguishable Proofs of Work or KnowledgeFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesBeyond software watermarking: traitor-tracing for pseudorandom functionsGeneric construction of trace-and-revoke inner product functional encryptionCollusion Resistant Traitor Tracing from Learning with ErrorsOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsA note on the security of KHL schemeDefending against Key Abuse Attacks in KP-ABE Enabled Broadcast SystemsFully collusion-resistant traitor tracing scheme with shorter ciphertextsFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysPublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeWatermarking cryptographic functionalities from standard lattice assumptionsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseScalable public-key tracing and revokingTrade-Off Traitor TracingTraitors Collaborating in Public: Pirates 2.0Identity-Based Trace and Revoke SchemesUsing Digital Watermarking for Securing Next Generation Media BroadcastsEfficient Traitor Tracing from Collusion Secure CodesA public-key traitor tracing scheme with revocation using dynamic sharesNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairings




This page was built for publication: