Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys

From MaRDI portal
Publication:3593119

DOI10.1007/11761679_34zbMath1140.94326OpenAlexW1481965140MaRDI QIDQ3593119

Amit Sahai, Dan Boneh, Brent Waters

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_34



Related Items

Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption, Traceable secret sharing and applications, Impossibility of order-revealing encryption in idealized models, Traitor-tracing from LWE made simple and attribute-based, White box traitor tracing, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Strong Hardness of Privacy from Weak Traitor Tracing, Research on quantum authentication methods for the secure access control among three elements of cloud computing, Watermarking PRFs against quantum adversaries, Traceable PRFs: Full Collusion Resistance and Active Security, New approaches to traitor tracing with embedded identities, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Hardness of \(k\)-LWE and applications in traitor tracing, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Watermarkable public key encryption with efficient extraction under standard assumptions, Beyond software watermarking: traitor-tracing for pseudorandom functions, A survey on functional encryption, (Augmented) broadcast encryption from identity based encryption with wildcard, Tracing quantum state distinguishers via backtracking, Improved hidden vector encryption with short ciphertexts and tokens, Finding composite order ordinary elliptic curves using the Cocks-Pinch method, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, Collusion Resistant Traitor Tracing from Learning with Errors, The relation and transformation between hierarchical inner product encryption and spatial encryption, Securely obfuscating re-encryption, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, An algebraic framework for Diffie-Hellman assumptions, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Tracing Malicious Proxies in Proxy Re-encryption, Watermarking cryptographic functionalities from standard lattice assumptions, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Order-Revealing Encryption and the Hardness of Private Learning, Defending against the Pirate Evolution Attack, Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Traitors Collaborating in Public: Pirates 2.0, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing, Fully Distributed Broadcast Encryption, Using abelian varieties to improve pairing-based cryptography, Efficient Traitor Tracing from Collusion Secure Codes, New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings, A performance evaluation of pairing-based broadcast encryption systems, The Complexity of Differential Privacy



Cites Work