Collusion resistant traitor tracing from learning with errors
From MaRDI portal
Publication:5230328
DOI10.1145/3188745.3188844zbMath1428.68087OpenAlexW2808828115MaRDI QIDQ5230328
Brent Waters, Venkata Koppula, Rishab Goyal
Publication date: 22 August 2019
Published in: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/3188745.3188844
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (24)
Traceable secret sharing and applications ⋮ Traitor-tracing from LWE made simple and attribute-based ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ White box traitor tracing ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Traceable PRFs: Full Collusion Resistance and Active Security ⋮ New approaches to traitor tracing with embedded identities ⋮ A survey of lattice based expressive attribute based encryption ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ Witness encryption and null-iO from evasive LWE ⋮ Franchised quantum money ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Tracing quantum state distinguishers via backtracking ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ ABE for DFA from LWE against bounded collusions, revisited ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Verifying quantum computations at scale: A cryptographic leash on quantum devices ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication: Collusion resistant traitor tracing from learning with errors