Sciweavers

54 search results - page 5 / 11
» Tracing Traitors
Sort
View
EUROCRYPT
2003
Springer
14 years 29 days ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Traitor Tracing Algorithms Using List Decoding
Abstract. We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. Although much work has focused on constructing traceability schemes,...
Alice Silverberg, Jessica Staddon, Judy L. Walker
ICASSP
2008
IEEE
14 years 2 months ago
Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation
We pose the problem of tracing traitors, who have colluded to circumvent a multimedia fingerprinting system, as a sparse underdetermined linear problem. We propose a range of det...
David P. Varodayan, Christine Pépin
AAAI
2007
13 years 10 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
EUROCRYPT
2005
Springer
14 years 1 months ago
Public Traceability in Traitor Tracing Schemes
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate dec...
Hervé Chabanne, Duong Hieu Phan, David Poin...