Tracing traitors

From MaRDI portal
Publication:4545764

DOI10.1109/18.841169zbMath1007.94017OpenAlexW2295616646MaRDI QIDQ4545764

Benny Chor, Benny Pinkas, Moni Naor, Amos Fiat

Publication date: 15 August 2002

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/becddb754d41fa2055be5d50eac0cade5b4004ce




Related Items

On the measurement complexity of differentially private query answeringAlmost separating and almost secure frameproof codes over \(q\)-ary alphabetsPirate decoder for the broadcast encryption schemes from Crypto 2005Codes for copyright protection: the case of two piratesNew upper bounds for parent-identifying codes and traceability codesTraceable PRFs: Full Collusion Resistance and Active SecurityNew approaches to traitor tracing with embedded identitiesHardness of \(k\)-LWE and applications in traitor tracingHardness-preserving reductions via cuckoo hashingIndividual cryptographyBeyond software watermarking: traitor-tracing for pseudorandom functionsCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsOptimal 2-traceability codes of length 4Collusion Resistant Traitor Tracing from Learning with ErrorsImproved upper bounds for parent-identifying set systems and separable codesUniqueness of some optimal superimposed codesA Note About the Traceability Properties of Linear CodesOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsConstructions of almost secure frameproof codes with applications to fingerprinting schemesOn 2-parent-identifying set systems of block size 4Recursive constructions of secure codes and hash families using difference function families.Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysNew constructions for IPP codesUnion-intersection-bounded families and their applicationsWatermarking cryptographic functionalities from standard lattice assumptionsDefending against the Pirate Evolution AttackTrade-Off Traitor TracingSeparable collusion-secure multimedia codesSymmetric Tardos fingerprinting codes for arbitrary alphabet sizesImproved versions of Tardos' fingerprinting schemeUpper bounds for parent-identifying set systemsWhat Can We Learn Privately?A class of I.P.P. codes with efficient identificationUpper Bounds for Set Systems with the Identifiable Parent PropertyEfficient Traitor Tracing from Collusion Secure CodesDistributing hash families with few rowsThe Complexity of Differential PrivacyA study of the separating property in Reed-Solomon codes by bounding the minimum distance