scientific article; zbMATH DE number 1418304
From MaRDI portal
Publication:4941864
zbMath0972.94029MaRDI QIDQ4941864
Publication date: 19 July 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (30)
Traceable secret sharing and applications ⋮ White box traitor tracing ⋮ Blending FHE-NTRU Keys – The Excalibur Property ⋮ Pirate decoder for the broadcast encryption schemes from Crypto 2005 ⋮ Separation and Witnesses ⋮ New approaches to traitor tracing with embedded identities ⋮ Black-box Trace\&Revoke codes ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Indistinguishable Proofs of Work or Knowledge ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems ⋮ A note on the security of KHL scheme ⋮ Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems ⋮ Fully collusion-resistant traitor tracing scheme with shorter ciphertexts ⋮ Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Scalable public-key tracing and revoking ⋮ Trade-Off Traitor Tracing ⋮ Traitors Collaborating in Public: Pirates 2.0 ⋮ Identity-Based Trace and Revoke Schemes ⋮ Using Digital Watermarking for Securing Next Generation Media Broadcasts ⋮ Efficient Traitor Tracing from Collusion Secure Codes ⋮ A public-key traitor tracing scheme with revocation using dynamic shares ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication: