Sciweavers

EUROCRYPT
2003
Springer
13 years 9 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
EUROCRYPT
2005
Springer
13 years 10 months ago
Public Traceability in Traitor Tracing Schemes
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate dec...
Hervé Chabanne, Duong Hieu Phan, David Poin...
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
13 years 10 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 11 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 5 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra