New approaches to traitor tracing with embedded identities
From MaRDI portal
Publication:2175935
DOI10.1007/978-3-030-36033-7_6zbMath1455.94159OpenAlexW2990081350MaRDI QIDQ2175935
Rishab Goyal, Venkata Koppula, Brent Waters
Publication date: 30 April 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-36033-7_6
Cryptography (94A60) Graph representations (geometric and intersection representations, etc.) (05C62)
Related Items
White box traitor tracing ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Tracing quantum state distinguishers via backtracking ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Traitor-tracing from LWE made simple and attribute-based
- Risky traitor tracing and new differential privacy negative results
- Practical functional encryption for quadratic functions with applications to predicate encryption
- On perfect correctness in (lockable) obfuscation
- Practical Multilinear Maps over the Integers
- Hardness of k-LWE and Applications in Traitor Tracing
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- New Multilinear Maps Over the Integers
- Efficient Pseudorandom Functions via On-the-Fly Adaptation
- Traitor Tracing with Optimal Transmission Rate
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Combinatorial properties of frameproof and traceability codes
- Tracing traitors
- Candidate Multilinear Maps from Ideal Lattices
- Practical Signatures from Standard Assumptions
- Collusion resistant traitor tracing from learning with errors
- Graph-Induced Multilinear Maps from Lattices
- Public Traceability in Traitor Tracing Schemes
- On the (im)possibility of obfuscating programs
- Efficient Traitor Tracing from Collusion Secure Codes
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Identity-Based Traitor Tracing