Identity-Based Traitor Tracing
From MaRDI portal
Publication:5756544
DOI10.1007/978-3-540-71677-8_24zbMath1127.94010OpenAlexW1818643063MaRDI QIDQ5756544
Duong Hieu Phan, Gregory Neven, Michel Abdalla, John Malone-Lee, Alexander W. Dent, Nigel P. Smart
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_24
Related Items (12)
Traitor-tracing from LWE made simple and attribute-based ⋮ New approaches to traitor tracing with embedded identities ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ Beyond software watermarking: traitor-tracing for pseudorandom functions ⋮ A survey on functional encryption ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Tracing Malicious Proxies in Proxy Re-encryption ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Identity-Based Trace and Revoke Schemes ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
This page was built for publication: Identity-Based Traitor Tracing