Efficient Traitor Tracing from Collusion Secure Codes
From MaRDI portal
Publication:5502800
DOI10.1007/978-3-540-85093-9_17zbMath1162.94340OpenAlexW2128210326MaRDI QIDQ5502800
Duong Hieu Phan, Olivier Billet
Publication date: 9 January 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85093-9_17
Related Items (14)
Traceable PRFs: Full Collusion Resistance and Active Security ⋮ New approaches to traitor tracing with embedded identities ⋮ Black-box Trace\&Revoke codes ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Tracing quantum state distinguishers via backtracking ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Fighting Pirates 2.0 ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Traitors Collaborating in Public: Pirates 2.0 ⋮ Identity-Based Trace and Revoke Schemes
Cites Work
- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
- Traitor Tracing for Shortened and Corrupted Fingerprints
- Traitor Tracing with Optimal Transmission Rate
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Tracing traitors
- All-or-nothing encryption and the package transform
- Applications of list decoding to tracing traitors
- Public Traceability in Traitor Tracing Schemes
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Optimal probabilistic fingerprint codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Efficient Traitor Tracing from Collusion Secure Codes