Publication:4941864

From MaRDI portal


zbMath0972.94029MaRDI QIDQ4941864

Dan Boneh, Matthew Franklin

Publication date: 19 July 2000



94A60: Cryptography


Related Items

Collusion Resistant Traitor Tracing from Learning with Errors, Separation and Witnesses, Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time, Trade-Off Traitor Tracing, Efficient Traitor Tracing from Collusion Secure Codes, Watermarking cryptographic functionalities from standard lattice assumptions, Scalable public-key tracing and revoking, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Beyond software watermarking: traitor-tracing for pseudorandom functions, Generic construction of trace-and-revoke inner product functional encryption, Black-box Trace\&Revoke codes, A note on the security of KHL scheme, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Hardness of \(k\)-LWE and applications in traitor tracing, Complete tree subset difference broadcast encryption scheme and its analysis, New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings, Traceable secret sharing and applications, White box traitor tracing, New approaches to traitor tracing with embedded identities, Pirate decoder for the broadcast encryption schemes from Crypto 2005, A public-key traitor tracing scheme with revocation using dynamic shares, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Indistinguishable Proofs of Work or Knowledge, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Identity-Based Trace and Revoke Schemes, Blending FHE-NTRU Keys – The Excalibur Property, Using Digital Watermarking for Securing Next Generation Media Broadcasts, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Traitors Collaborating in Public: Pirates 2.0