Black-box Trace\&Revoke codes
From MaRDI portal
Publication:378263
DOI10.1007/S00453-012-9702-YzbMATH Open1283.94077DBLPjournals/algorithmica/NgoPP13OpenAlexW1980101601WikidataQ56921016 ScholiaQ56921016MaRDI QIDQ378263FDOQ378263
Authors: Duong Hieu Phan, David Pointcheval, Hung Q. Ngo
Publication date: 11 November 2013
Published in: Algorithmica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00453-012-9702-y
Recommendations
- Codes based tracing and revoking scheme with constant ciphertext
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- scientific article; zbMATH DE number 1842486
- scientific article; zbMATH DE number 2087909
- Improving the Boneh-Franklin Traitor Tracing Scheme
Cites Work
- A threshold of ln n for approximating set cover
- Graph theory
- Title not available (Why is that?)
- A Greedy Heuristic for the Set-Covering Problem
- On the ratio of optimal integral and fractional covers
- Public key broadcast encryption for stateless receivers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Combinatorial properties of frameproof and traceability codes
- Title not available (Why is that?)
- Families of finite sets in which no set is covered by the union of \(r\) others
- Title not available (Why is that?)
- Efficiently decodable compressed sensing by list-recoverable codes and recursion
- Traitor Tracing with Optimal Transmission Rate
- Tracing Many Users With Almost No Rate Penalty
- Title not available (Why is that?)
- A Revocation Scheme with Minimal Storage at Receivers
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient Traitor Tracing from Collusion Secure Codes
- Applied Cryptography and Network Security
- Optimal probabilistic fingerprint codes
Cited In (8)
- Codes based tracing and revoking scheme with constant ciphertext
- Broadcast Encryption and Traitor Tracing
- Pirate decoder for the broadcast encryption schemes from Crypto 2005
- Title not available (Why is that?)
- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem
- Barriers to black-box constructions of traitor tracing systems
- Encryption for digital content
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
This page was built for publication: Black-box Trace\&Revoke codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q378263)