ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Hardness of k-LWE and Applications in Traitor Tracing
Algorithmica
◽
10.1007/s00453-016-0251-7
◽
2016
◽
Vol 79
(4)
◽
pp. 1318-1352
◽
Cited By ~ 1
Author(s):
San Ling
◽
Duong Hieu Phan
◽
Damien Stehlé
◽
Ron Steinfeld
Keyword(s):
Traitor Tracing
Start Chat
Download Full-text
Related Documents
Cited By
References
Modified fully public-key traitor tracing schemes
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings (ICWMMN 2006)
◽
10.1049/cp:20061558
◽
2006
◽
Author(s):
Chen Yang
◽
Xiangguo Cheng
◽
Wenping Ma
◽
Xinmei Wang
Keyword(s):
Public Key
◽
Traitor Tracing
◽
Traitor Tracing Schemes
Start Chat
Download Full-text
On the security of a public-key traitor tracing scheme with sublinear ciphertext size
Proceedings of the nineth ACM workshop on Digital rights management - DRM '09
◽
10.1145/1655048.1655050
◽
2009
◽
Cited By ~ 2
Author(s):
Aggelos Kiayias
◽
Serdar Pehlivanoglu
Keyword(s):
Public Key
◽
Traitor Tracing
Start Chat
Download Full-text
Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
EURASIP Journal on Information Security
◽
10.1186/s13635-014-0012-6
◽
2014
◽
Vol 2014
(1)
◽
Cited By ~ 1
Author(s):
Sarah Ibrahimi
◽
Boris Škorić
◽
Jan-Jaap Oosterwijk
Keyword(s):
Saddle Point
◽
Traitor Tracing
Start Chat
Download Full-text
Strong Hardness of Privacy from Weak Traitor Tracing
Theory of Cryptography - Lecture Notes in Computer Science
◽
10.1007/978-3-662-53641-4_25
◽
2016
◽
pp. 659-689
◽
Cited By ~ 4
Author(s):
Lucas Kowalczyk
◽
Tal Malkin
◽
Jonathan Ullman
◽
Mark Zhandry
Keyword(s):
Traitor Tracing
Start Chat
Download Full-text
White-Box Traitor-Tracing from Tardos Probabilistic Codes
Innovative Security Solutions for Information Technology and Communications - Lecture Notes in Computer Science
◽
10.1007/978-3-030-41025-4_9
◽
2020
◽
pp. 125-141
Author(s):
Sandra Rasoamiaramanana
◽
Gilles Macario-Rat
◽
Marine Minier
Keyword(s):
Traitor Tracing
Start Chat
Download Full-text
Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks
2008 5th IEEE Consumer Communications and Networking Conference
◽
10.1109/ccnc08.2007.248
◽
2008
◽
Cited By ~ 2
Author(s):
Bin Zhu
◽
Min Feng
◽
Fen Liu
◽
Lei Hu
Keyword(s):
Traitor Tracing
◽
Mix And Match
Start Chat
Download Full-text
NIS07-4: Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments
IEEE Globecom 2006
◽
10.1109/glocom.2006.299
◽
2006
◽
Cited By ~ 4
Author(s):
Masaru Dobashi
◽
Hidehisa Nakayama
◽
Nei Kato
◽
Yoshiaki Nemoto
◽
Abbas Jamalipour
Keyword(s):
Traitor Tracing
◽
Traffic Pattern
◽
Wireless Environments
Start Chat
Download Full-text
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-28166-7_7
◽
2015
◽
pp. 127-146
◽
Cited By ~ 19
Author(s):
Zhen Liu
◽
Duncan S. Wong
Keyword(s):
Traitor Tracing
◽
Attribute Based Encryption
◽
Ciphertext Policy
Start Chat
Download Full-text
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-11145-7_11
◽
2009
◽
pp. 121-134
◽
Cited By ~ 3
Author(s):
Yi-Ruei Chen
◽
Wen-Guey Tzeng
Keyword(s):
Transmission Rate
◽
Public Key
◽
Traitor Tracing
Start Chat
Download Full-text
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/11780656_11
◽
2006
◽
pp. 123-135
◽
Cited By ~ 1
Author(s):
Kazuto Ogawa
◽
Goichiro Hanaoka
◽
Hideki Imai
Keyword(s):
Traitor Tracing
◽
Key Exposure
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close