scientific article; zbMATH DE number 1406785

From MaRDI portal
Revision as of 08:42, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4940701

zbMath0939.94555MaRDI QIDQ4940701

Benny Chor, Moni Naor, Amos Fiat

Publication date: 1 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An upper bound on the size of a code with the \(k\)-identifiable parent propertyTraceable secret sharing and applicationsImproved algorithms for group testing with inhibitorsProtocols for collusion-secure asymmetric fingerprintingTraitor-tracing from LWE made simple and attribute-basedWhite box traitor tracingStrong Hardness of Privacy from Weak Traitor TracingSequential and dynamic frameproof codesAnalysis of properties of \(q\)-ary Reed-Muller error-correcting codes viewed as codes for copyright protectionPirate decoder for the broadcast encryption schemes from Crypto 2005Codes for copyright protection: the case of two piratesNew upper bounds for parent-identifying codes and traceability codesUnnamed ItemMaking \textit{any} attribute-based encryption accountable, efficientlySeparation and WitnessesEqual-Weight Fingerprinting CodesBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresWatermarking PRFs against quantum adversariesNew approaches to traitor tracing with embedded identitiesBlack-box Trace\&Revoke codesOn tight bounds for binary frameproof codesComplete tree subset difference broadcast encryption scheme and its analysisBroadcast, trace and revoke with optimal parameters from polynomial hardnessTraitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-LinMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationHardness of \(k\)-LWE and applications in traitor tracingTracing a linear subspace: application to linearly-homomorphic group signaturesSecure and Efficient Construction of Broadcast Encryption with DealershipGeneralization of IPP codes and IPP set systemsTraceability codes and their generalizationsAdaptive multiparty NIKEFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesWatermarkable public key encryption with efficient extraction under standard assumptionsFranchised quantum moneyBeyond software watermarking: traitor-tracing for pseudorandom functionsGeneric construction of trace-and-revoke inner product functional encryptionTracing quantum state distinguishers via backtrackingOn non-binary traceability set systemsCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsOptimal 2-traceability codes of length 4Generalized hashing and parent-identifying codes.Wide-sense 2-frameproof codesTraceability codesCollusion Resistant Traitor Tracing from Learning with ErrorsConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Improved upper bounds for parent-identifying set systems and separable codesAdaptively Secure Broadcast Encryption with DealershipA Note About the Traceability Properties of Linear CodesSome intriguing upper bounds for separating hash familiesExistence and construction of complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noiseOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsChameleon — A new kind of stream cipherA note on the security of KHL schemeON APPLICATION OF ALGEBRAIC GEOMETRY CODES OF L-CONSTRUCTION IN COPY PROTECTIONDefending against Key Abuse Attacks in KP-ABE Enabled Broadcast SystemsFighting Pirates 2.0On traceability property of equidistant codesCodes with the identifiable parent property for multimedia fingerprintingA tight bound for frameproof codes viewed in terms of separating hash familiesOn 2-parent-identifying set systems of block size 4Fully collusion-resistant traitor tracing scheme with shorter ciphertextsFully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysNew constructions for IPP codesTracing Malicious Proxies in Proxy Re-encryptionUnion-intersection-bounded families and their applicationsWatermarking cryptographic functionalities from standard lattice assumptionsOrder-Revealing Encryption and the Hardness of Private LearningScalable public-key tracing and revokingDefending against the Pirate Evolution AttackTrade-Off Traitor TracingAnswering $n^2+o(1)$ Counting Queries with Differential Privacy is HardSeparable collusion-secure multimedia codesImproved versions of Tardos' fingerprinting schemeTraitors Collaborating in Public: Pirates 2.0Candidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsA ramp model for distributed key distribution schemesIntersecting codes and separating codesTowards accountability in CRS generationIdentity-Based Trace and Revoke SchemesPrivacy-Aware Attribute-Based Encryption with User AccountabilityA new key escrow cryptosystemSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresA class of I.P.P. codes with efficient identificationSynthesizers and their application to the parallel construction of pseudo-random functionsEfficient Traitor Tracing from Collusion Secure CodesA public-key traitor tracing scheme with revocation using dynamic sharesCollusion resistant watermarkable PRFs from standard assumptionsNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairingsAnonymous trace and revokeA study of the separating property in Reed-Solomon codes by bounding the minimum distance