Sciweavers

54 search results - page 2 / 11
» Tracing Traitors
Sort
View
JCST
2010
147views more  JCST 2010»
12 years 11 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
13 years 8 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 11 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
ASIACRYPT
2004
Springer
13 years 10 months ago
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved again...
Tatsuyuki Matsushita, Hideki Imai
CCS
2008
ACM
13 years 6 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor