Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
From MaRDI portal
Publication:2304948
DOI10.1007/978-3-030-26954-8_27OpenAlexW2968981520MaRDI QIDQ2304948
Brent Waters, Willy Quach, Rishab Goyal, Daniel Wichs
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26954-8_27
Related Items (11)
Traceable PRFs: Full Collusion Resistance and Active Security ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Optimal broadcast encryption from pairings and LWE ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication: Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions