Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
From MaRDI portal
Publication:5048941
DOI10.1007/BFB0023476zbMATH Open1498.68096OpenAlexW1573750760MaRDI QIDQ5048941FDOQ5048941
Authors: Ingrid Biehl, Bernd Meyer
Publication date: 9 November 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bfb0023476
Recommendations
- Cryptographic methods for collusion-secure fingerprinting of digital data
- Communication optimal Tardos-based asymmetric fingerprinting
- Asymmetric fingerprinting
- Private asymmetric fingerprinting: a protocol with optimal traitor tracing using Tardos codes
- Collusion-secure fingerprinting for digital data
Cites Work
Cited In (6)
- Private asymmetric fingerprinting: a protocol with optimal traitor tracing using Tardos codes
- Communication optimal Tardos-based asymmetric fingerprinting
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- Title not available (Why is that?)
- Cryptographic methods for collusion-secure fingerprinting of digital data
- Asymmetric fingerprinting
This page was built for publication: Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5048941)