Identity-Based Traitor Tracing
From MaRDI portal
Publication:5756544
DOI10.1007/978-3-540-71677-8_24zbMATH Open1127.94010OpenAlexW1818643063MaRDI QIDQ5756544FDOQ5756544
Authors: Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, N. P. Smart
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_24
Recommendations
Cited In (16)
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Traitor-tracing from LWE made simple and attribute-based
- Watermarking cryptographic functionalities from standard lattice assumptions
- A survey on functional encryption
- Collusion resistant traitor tracing from learning with errors
- An efficient identity tracing scheme for blockchain-based systems
- Title not available (Why is that?)
- Identity-based trace and revoke schemes
- Hardness of \(k\)-LWE and applications in traitor tracing
- Tracing Malicious Proxies in Proxy Re-encryption
- Generic construction of trace-and-revoke inner product functional encryption
- A blind signature-based protocol for tracing traitors
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- New approaches to traitor tracing with embedded identities
- Information and Communications Security
This page was built for publication: Identity-Based Traitor Tracing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5756544)