Identity-Based Traitor Tracing
From MaRDI portal
Publication:5756544
Recommendations
Cited in
(16)- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Collusion resistant traitor tracing from learning with errors
- scientific article; zbMATH DE number 5647810 (Why is no real title available?)
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Traitor-tracing from LWE made simple and attribute-based
- Watermarking cryptographic functionalities from standard lattice assumptions
- Hardness of \(k\)-LWE and applications in traitor tracing
- Tracing Malicious Proxies in Proxy Re-encryption
- Generic construction of trace-and-revoke inner product functional encryption
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- An efficient identity tracing scheme for blockchain-based systems
- New approaches to traitor tracing with embedded identities
- Identity-based trace and revoke schemes
- Information and Communications Security
- A survey on functional encryption
- A blind signature-based protocol for tracing traitors
This page was built for publication: Identity-Based Traitor Tracing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5756544)