Communication Optimal Tardos-Based Asymmetric Fingerprinting
From MaRDI portal
Publication:2790060
DOI10.1007/978-3-319-16715-2_25zbMath1382.94129OpenAlexW2283130107MaRDI QIDQ2790060
Aggelos Kiayias, Kateryna Pavlyk, Qiang Tang, Helger Lipmaa, Nikos Leonardos
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_25
Related Items (8)
On the privacy of a code-based single-server computational PIR scheme ⋮ Making \textit{any} attribute-based encryption accountable, efficiently ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Adaptive Oblivious Transfer and Generalization ⋮ \textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDH ⋮ Communication Optimal Tardos-Based Asymmetric Fingerprinting ⋮ Breaking the Circuit Size Barrier for Secure Computation Under DDH ⋮ A Simpler Rate-Optimal CPIR Protocol
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Encryption for digital content
- Security and composition of multiparty cryptographic protocols
- Communication Optimal Tardos-Based Asymmetric Fingerprinting
- Asymmetric Fingerprinting
- Secure Two-Party Computation with Low Communication
- Evaluating Branching Programs on Encrypted Data
- A New Protocol for Conditional Disclosure of Secrets and Its Applications
- Foundations of Cryptography
- On the Power of Correlated Randomness in Secure Computation
- Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
- Communication preserving protocols for secure function evaluation
- Strong Conditional Oblivious Transfer and Computing on Intervals
- Optimal probabilistic fingerprint codes
- Public Key Cryptography – PKC 2004
This page was built for publication: Communication Optimal Tardos-Based Asymmetric Fingerprinting