Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
From MaRDI portal
Publication:5048941
Recommendations
- Cryptographic methods for collusion-secure fingerprinting of digital data
- Communication optimal Tardos-based asymmetric fingerprinting
- Asymmetric fingerprinting
- Private asymmetric fingerprinting: a protocol with optimal traitor tracing using Tardos codes
- Collusion-secure fingerprinting for digital data
Cites work
- scientific article; zbMATH DE number 4191106 (Why is no real title available?)
- scientific article; zbMATH DE number 4101088 (Why is no real title available?)
- scientific article; zbMATH DE number 1030976 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
- The Knowledge Complexity of Interactive Proof Systems
Cited in
(6)- Private asymmetric fingerprinting: a protocol with optimal traitor tracing using Tardos codes
- Communication optimal Tardos-based asymmetric fingerprinting
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- scientific article; zbMATH DE number 5059862 (Why is no real title available?)
- Cryptographic methods for collusion-secure fingerprinting of digital data
- Asymmetric fingerprinting
This page was built for publication: Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5048941)