Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
From MaRDI portal
Publication:5739209
DOI10.1007/978-3-662-49896-5_14zbMath1371.94652OpenAlexW2466749404MaRDI QIDQ5739209
Daniel Wichs, Ryo Nishimaki, Mark Zhandry
Publication date: 15 July 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_14
Related Items (20)
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption ⋮ Traceable secret sharing and applications ⋮ White box traitor tracing ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ New approaches to traitor tracing with embedded identities ⋮ Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Functional encryption with secure key leasing ⋮ Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Tracing quantum state distinguishers via backtracking ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Arrangements of Pseudocircles: Triangles and Drawings ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Functional Encryption for Turing Machines ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication: Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key