Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
From MaRDI portal
Publication:3593119
DOI10.1007/11761679_34zbMath1140.94326OpenAlexW1481965140MaRDI QIDQ3593119
Amit Sahai, Dan Boneh, Brent Waters
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_34
Related Items
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption, Traceable secret sharing and applications, Impossibility of order-revealing encryption in idealized models, Traitor-tracing from LWE made simple and attribute-based, White box traitor tracing, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Strong Hardness of Privacy from Weak Traitor Tracing, Research on quantum authentication methods for the secure access control among three elements of cloud computing, Watermarking PRFs against quantum adversaries, Traceable PRFs: Full Collusion Resistance and Active Security, New approaches to traitor tracing with embedded identities, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Hardness of \(k\)-LWE and applications in traitor tracing, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Watermarkable public key encryption with efficient extraction under standard assumptions, Beyond software watermarking: traitor-tracing for pseudorandom functions, A survey on functional encryption, (Augmented) broadcast encryption from identity based encryption with wildcard, Tracing quantum state distinguishers via backtracking, Improved hidden vector encryption with short ciphertexts and tokens, Finding composite order ordinary elliptic curves using the Cocks-Pinch method, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, Collusion Resistant Traitor Tracing from Learning with Errors, The relation and transformation between hierarchical inner product encryption and spatial encryption, Securely obfuscating re-encryption, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, An algebraic framework for Diffie-Hellman assumptions, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Tracing Malicious Proxies in Proxy Re-encryption, Watermarking cryptographic functionalities from standard lattice assumptions, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Order-Revealing Encryption and the Hardness of Private Learning, Defending against the Pirate Evolution Attack, Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Traitors Collaborating in Public: Pirates 2.0, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Fully Distributed Broadcast Encryption, Using abelian varieties to improve pairing-based cryptography, Efficient Traitor Tracing from Collusion Secure Codes, New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings, A performance evaluation of pairing-based broadcast encryption systems, The Complexity of Differential Privacy
Cites Work
- Breaking and Repairing Asymmetric Public-Key Traitor Tracing
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Combinatorial properties of frameproof and traceability codes
- Tracing traitors
- Collusion-secure fingerprinting for digital data
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Public Traceability in Traitor Tracing Schemes
- Theory of Cryptography
- Optimal probabilistic fingerprint codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item