Beyond software watermarking: traitor-tracing for pseudorandom functions
From MaRDI portal
Publication:6157551
DOI10.1007/978-3-030-92078-4_9OpenAlexW4247672491MaRDI QIDQ6157551
No author found.
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92078-4_9
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68Nxx)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Traitor-tracing from LWE made simple and attribute-based
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Risky traitor tracing and new differential privacy negative results
- Private constrained PRFs (and more) from LWE
- Privately constraining and programming PRFs, the LWE way
- Unforgeable watermarking schemes with public extraction
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Collusion resistant watermarkable PRFs from standard assumptions
- New approaches to traitor tracing with embedded identities
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking public-key cryptographic primitives
- Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- Constrained Pseudorandom Functions and Their Applications
- Hardness of k-LWE and Applications in Traitor Tracing
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Traitor Tracing with Optimal Transmission Rate
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- From Weak to Strong Watermarking
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Combinatorial properties of frameproof and traceability codes
- Tracing traitors
- How to Watermark Cryptographic Functions
- Collusion Resistant Traitor Tracing from Learning with Errors
- Collusion resistant traitor tracing from learning with errors
- How to use indistinguishability obfuscation
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
- Advances in Cryptology – CRYPTO 2004
- Watermarking cryptographic capabilities
- Public Traceability in Traitor Tracing Schemes
- On the (im)possibility of obfuscating programs
- Functional Signatures and Pseudorandom Functions
- Efficient Traitor Tracing from Collusion Secure Codes
- Constraining Pseudorandom Functions Privately
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Identity-Based Traitor Tracing
- Watermarking cryptographic functionalities from standard lattice assumptions
- Indistinguishability obfuscation from well-founded assumptions
This page was built for publication: Beyond software watermarking: traitor-tracing for pseudorandom functions