Black-box Trace\&Revoke codes
From MaRDI portal
Recommendations
- Codes based tracing and revoking scheme with constant ciphertext
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- scientific article; zbMATH DE number 1842486
- scientific article; zbMATH DE number 2087909
- Improving the Boneh-Franklin Traitor Tracing Scheme
Cites work
- scientific article; zbMATH DE number 177621 (Why is no real title available?)
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1030976 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 1508646 (Why is no real title available?)
- scientific article; zbMATH DE number 1759344 (Why is no real title available?)
- scientific article; zbMATH DE number 2086724 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- scientific article; zbMATH DE number 1418304 (Why is no real title available?)
- A Greedy Heuristic for the Set-Covering Problem
- A Revocation Scheme with Minimal Storage at Receivers
- A threshold of ln n for approximating set cover
- Applied Cryptography and Network Security
- Combinatorial properties of frameproof and traceability codes
- Efficient Traitor Tracing from Collusion Secure Codes
- Efficiently decodable compressed sensing by list-recoverable codes and recursion
- Families of finite sets in which no set is covered by the union of \(r\) others
- Graph theory
- On the ratio of optimal integral and fractional covers
- Optimal probabilistic fingerprint codes
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Public key broadcast encryption for stateless receivers
- Tracing Many Users With Almost No Rate Penalty
- Traitor Tracing with Optimal Transmission Rate
Cited in
(8)- Codes based tracing and revoking scheme with constant ciphertext
- Barriers to black-box constructions of traitor tracing systems
- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem
- Encryption for digital content
- scientific article; zbMATH DE number 1980960 (Why is no real title available?)
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- Pirate decoder for the broadcast encryption schemes from Crypto 2005
- Broadcast Encryption and Traitor Tracing
This page was built for publication: Black-box Trace\&Revoke codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q378263)