Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
From MaRDI portal
Publication:548093
DOI10.1007/S10623-010-9431-7zbMATH Open1233.94022OpenAlexW2001712848WikidataQ122617489 ScholiaQ122617489MaRDI QIDQ548093FDOQ548093
Authors: Yong-Cai Geng, Sumit K. Garg
Publication date: 28 June 2011
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-010-9431-7
Recommendations
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Efficient Traitor Tracing from Collusion Secure Codes
- Public Traceability in Traitor Tracing Schemes
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Publication:4941864
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Collusion-secure fingerprinting for digital data
- Pairings for cryptographers
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Compact E-Cash
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Optimal probabilistic fingerprint codes
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Title not available (Why is that?)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Title not available (Why is that?)
- Breaking and repairing asymmetric public-key traitor tracing
- Title not available (Why is that?)
- Public Traceability in Traitor Tracing Schemes
Cited In (7)
- Public Traceability in Traitor Tracing Schemes
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Efficient anonymous multi-group broadcast encryption
- Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
- A Traitor Tracing Scheme Based on RSA for Fast Decryption
- A multi-service oriented collusion-resistant public-key traitor tracing scheme
- Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q548093)