Sciweavers

54 search results - page 8 / 11
» Tracing Traitors
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
Key Recovery on Hidden Monomial Multivariate Schemes
Abstract. The problem we study in this paper is the key recovery problem on the C schemes and generalizations where the quadratic monomial of C (the product of two linear monomials...
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques S...
DCC
2005
IEEE
14 years 7 months ago
New Constructions for IPP Codes
Identifiable parent property (IPP) codes are introduced to provide protection against illegal producing of copyrighted digital material. In this paper we consider explicit constru...
Tran van Trung, Sosina Martirosyan
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
14 years 8 days ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
CCS
2006
ACM
13 years 11 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters
ICIP
2007
IEEE
14 years 9 months ago
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu