Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
From MaRDI portal
(Redirected from Publication:548093)
Recommendations
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Efficient Traitor Tracing from Collusion Secure Codes
- Public Traceability in Traitor Tracing Schemes
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Publication:4941864
Cites work
- scientific article; zbMATH DE number 1617941 (Why is no real title available?)
- scientific article; zbMATH DE number 1303119 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 2081083 (Why is no real title available?)
- scientific article; zbMATH DE number 1759344 (Why is no real title available?)
- scientific article; zbMATH DE number 2086724 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- scientific article; zbMATH DE number 1418304 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Breaking and repairing asymmetric public-key traitor tracing
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Collusion-secure fingerprinting for digital data
- Compact E-Cash
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Optimal probabilistic fingerprint codes
- Pairings for cryptographers
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Public Traceability in Traitor Tracing Schemes
Cited in
(7)- Public Traceability in Traitor Tracing Schemes
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Efficient anonymous multi-group broadcast encryption
- Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
- A Traitor Tracing Scheme Based on RSA for Fast Decryption
- A multi-service oriented collusion-resistant public-key traitor tracing scheme
- Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q548093)