Interested in racing? We have collected a lot of interesting things about A Public-Key Black-Box Traitor Tracing Scheme. Follow the links and you will find all the information you need about A Public-Key Black-Box Traitor Tracing Scheme.
A Public-Key Black-Box Traitor Tracing Scheme with …
https://link.springer.com/chapter/10.1007/978-3-540-30539-2_19
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate decoders. When assuming that a pirate decoder can take some...
LNCS 3329 - A Public-Key Black-Box Traitor Tracing …
https://link.springer.com/content/pdf/10.1007/978-3-540-30539-2_19.pdf
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate de-coders.Whenassumingthatapiratedecodercantakesomeself-defensive reaction (e.g., erasing all of the internal keys and shutting down) to es-
Table 2 from A Public-Key Black-Box Traitor Tracing …
https://www.semanticscholar.org/paper/A-Public-Key-Black-Box-Traitor-Tracing-Scheme-with-Matsushita-Imai/8e32719af148acb852a8d7ca9d09d1d1a6c83c45/figure/1
Table 2. Efficiency comparison (P, S, H: sets of possible personal keys, session keys, and headers respectively, n: the total number of subscribers, k: the maximum coalition size, c: a constant (0 < c < 1), ε: negligible probability) - "A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates"
A Public-Key Black-Box Traitor Tracing Scheme with …
https://www.iacr.org/archive/asiacrypt2004/33290258/33290258.pdf
Among traitor tracing schemes, our interest is in a black-box tracing scheme in the public-key setting. In black-box tracing, a tracer does not break open the pirate decoder but uses it as a black box. Brie y, the tracer chooses a set of suspects and tests whether traitors are included in it only by observing the
A Public-Key Black-Box Traitor Tracing Scheme with …
https://www.iacr.org/conferences/asiacrypt2004/data/Asiacrypt2004/06%20Key%20Management/03_Tatsuyuki%20Matsushita.pdf
Black-box tracing Traitors can be identified from the pirate decoder used as a black box The tracer chooses a set of suspects and inputs the header which can (or cannot) be decrypted by the selected suspects A scheme in which header size is linear in the total number of users is trivial Pirate decoder Input (header) Output
A Public-Key Black-Box Traitor Tracing Scheme with …
https://www.semanticscholar.org/paper/A-Public-Key-Black-Box-Traitor-Tracing-Scheme-with-Matsushita-Imai/8e32719af148acb852a8d7ca9d09d1d1a6c83c45
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate decoders.
A Public-Key Traitor Tracing Scheme with an Optimal …
https://link.springer.com/chapter/10.1007/978-3-642-11145-7_11
In this paper, we propose a public-key traitor tracing scheme that has optimal transmission rate. In other words, our scheme enables everyone to transmit the encrypted digital contents almost without any redundancy. As for tracing, our scheme supports black-box tracing, i.e., identifying colluders without opening the pirate decoder.
Optimal Public Key Traitor Tracing Scheme in Non-Black …
https://link.springer.com/chapter/10.1007%2F978-3-642-38553-7_8
Beside the most important open problem of obtimizing the black-box tracing, Boneh-Franklin also left an open problem concerning non-black-box tracing, by mentioning: “it seems reasonable to believe that there exists an efficient public key traitor tracing scheme that is completely collusion resistant.
Copyrighting Public-key Functions and Applications …
https://eprint.iacr.org/2006/458.pdf
Two desirable properties of a traitor tracing scheme are (i) Public-key traitor tracing, where any third party is able to send secure messages to the set of subscribers (in- creasing the functionality and scale of the service); and (ii) Black-box traitor tracing, which
Got enough information about A Public-Key Black-Box Traitor Tracing Scheme?
We hope that the information collected by our experts has provided answers to all your questions. Now let's race!