scientific article; zbMATH DE number 1303119
From MaRDI portal
Publication:4249634
Recommendations
Cited in
(42)- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
- Bayesian Methods for Practical Traitor Tracing
- New approaches to traitor tracing with embedded identities
- Scalable public-key tracing and revoking
- Multi-round secure light-weight broadcast exclusion protocol with pre-processing
- scientific article; zbMATH DE number 1617941 (Why is no real title available?)
- A public-key traitor tracing scheme with revocation using dynamic shares
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- On a traitor tracing scheme from ACISP 2003
- A traceable block cipher
- Trade-Off Traitor Tracing
- Tracing traitors
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Key distribution schemes using combinatorial designs to identify all traitors
- Traceable secret sharing and applications
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- Watermarking cryptographic functionalities from standard lattice assumptions
- Collusion resistant traitor tracing from learning with errors
- Improving the round complexity of traitor tracing schemes
- White box traitor tracing
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- scientific article; zbMATH DE number 1618052 (Why is no real title available?)
- Traitor Tracing with Optimal Transmission Rate
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Identity-based trace and revoke schemes
- Improving the Boneh-Franklin Traitor Tracing Scheme
- scientific article; zbMATH DE number 1755748 (Why is no real title available?)
- scientific article; zbMATH DE number 1418306 (Why is no real title available?)
- Hardness of \(k\)-LWE and applications in traitor tracing
- Accountability for misbehavior in threshold decryption via threshold traitor tracing
- Traceable secret sharing: strong security and efficient constructions
- Fighting Pirates 2.0
- Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme
- scientific article; zbMATH DE number 1583950 (Why is no real title available?)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- scientific article; zbMATH DE number 2086724 (Why is no real title available?)
- A Traitor Tracing Scheme Based on RSA for Fast Decryption
- Information Security Practice and Experience
- Efficient Traitor Tracing from Collusion Secure Codes
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249634)