scientific article; zbMATH DE number 1303119
From MaRDI portal
Publication:4249634
zbMATH Open0919.94025MaRDI QIDQ4249634FDOQ4249634
Authors: Kaoru Kurosawa, Yvo Desmedt
Publication date: 9 September 1999
Title of this publication is not available (Why is that?)
Recommendations
Cited In (42)
- Multi-round secure light-weight broadcast exclusion protocol with pre-processing
- Title not available (Why is that?)
- A public-key traitor tracing scheme with revocation using dynamic shares
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- A traceable block cipher
- Trade-Off Traitor Tracing
- Tracing traitors
- On a traitor tracing scheme from ACISP 2003
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Key distribution schemes using combinatorial designs to identify all traitors
- Traceable secret sharing and applications
- Title not available (Why is that?)
- Watermarking cryptographic functionalities from standard lattice assumptions
- Collusion resistant traitor tracing from learning with errors
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Improving the round complexity of traitor tracing schemes
- White box traitor tracing
- Title not available (Why is that?)
- Traitor Tracing with Optimal Transmission Rate
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Identity-based trace and revoke schemes
- Improving the Boneh-Franklin Traitor Tracing Scheme
- Title not available (Why is that?)
- Title not available (Why is that?)
- Accountability for misbehavior in threshold decryption via threshold traitor tracing
- Traceable secret sharing: strong security and efficient constructions
- Hardness of \(k\)-LWE and applications in traitor tracing
- Fighting Pirates 2.0
- Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme
- Title not available (Why is that?)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions
- Title not available (Why is that?)
- Information Security Practice and Experience
- A Traitor Tracing Scheme Based on RSA for Fast Decryption
- Efficient Traitor Tracing from Collusion Secure Codes
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
- Bayesian Methods for Practical Traitor Tracing
- New approaches to traitor tracing with embedded identities
- Scalable public-key tracing and revoking
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249634)