搜索结果: 1-15 共查到“军队指挥学 traitor tracing”相关记录28条 . 查询时间(0.046 秒)
New Approaches to Traitor Tracing with Embedded Identities
traitor tracing public-key cryptography
font style='font-size:12px;'>
2019/8/30
In a traitor tracing (TT) system for nn users, every user has his/her own secret key. Content providers can encrypt messages using a public key, and each user can decrypt the ciphertext using his/her ...
Traitor-Tracing from LWE Made Simple and Attribute-Based
LWE Made Simple Attribute-Based
font style='font-size:12px;'>
2018/11/9
A traitor tracing scheme is a public key encryption scheme for which there are many secret decryption keys. Any of these keys can decrypt a ciphertext; moreover, even if a coalition of users collude, ...
Collusion Resistant Traitor Tracing from Learning with Errors
Traitor Tracing LWE
font style='font-size:12px;'>
2018/4/17
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially in log(n) where n is the number of users and prove it secure under the Learning with Errors (LWE) assumpt...
Risky Traitor Tracing and New Differential Privacy Negative Results
Traitor Tracing Differential Privacy
font style='font-size:12px;'>
2017/11/27
Finally, we can capture impossibility results for differential privacy from risky traitor tracing. Since our ciphertexts are short (O(λ)O(λ)), thus we get the negative result which matches what one wo...
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
Traitor Tracing Revocation Ciphertext-policy Attribute Based Encryption
font style='font-size:12px;'>
2016/12/15
A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE sch...
Strong Hardness of Privacy from Weak Traitor Tracing
differential privacy traitor-tracing indistinguishability obfuscation
font style='font-size:12px;'>
2016/7/22
Despite much study, the computational complexity of differential privacy remains poorly understood. In this paper we consider the computational complexity of accurately answering a family QQ of statis...
Tuple decoders for traitor tracing schemes
Collusion resistance traitor tracing
font style='font-size:12px;'>
2016/1/25
In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion
function for simple decoders. Earlier, Moulin also considered another type of decoder:...
Hardness of k-LWE and Applications in Traitor Tracing
Traitor Tracing polynomial loss
font style='font-size:12px;'>
2016/1/8
We introduce the k-LWE problem, a Learning With Errors variant of the k-SIS problem. The Boneh-Freeman reduction from SIS to k-SIS suffers from an exponential loss in k. We improve and extend it to a...
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Attribute-Based Encryption Traitor Tracing Revocation
font style='font-size:12px;'>
2016/1/8
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user's decryption key is associated with attributes which in general are not related to the user's identity, and the same set of attributes ...
Tally-based simple decoders for traitor tracing and group testing
traitor tracing Tardos code collusion
font style='font-size:12px;'>
2016/1/6
In this paper we construct a score system from the Neyman-Pearson hypothesis test (which is known to be the most powerful test possible) into which we feed all the evidence available to the tracer, in...
Generalised tally-based decoders for traitor tracing and group testing
traitor tracing group testing fingerprinting
font style='font-size:12px;'>
2015/12/29
We propose a new type of score function for Tardos traitor tracing codes. It is related to the recently introduced tally-based score function, but it utilizes more of the information available to the ...
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
public-key cryptography Traitor tracing
font style='font-size:12px;'>
2015/12/24
In a traitor tracing scheme, each user is given a different decryption key. A content distributor can
encrypt digital content using a public encryption key and each user in the system can decrypt it ...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
obfuscation multi-party key exchange,
font style='font-size:12px;'>
2014/3/7
In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several intere...
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
traitor tracing
font style='font-size:12px;'>
2014/3/5
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distributi...
The Holey Grail: A special score function for non-binary traitor tracing
traitor tracing
font style='font-size:12px;'>
2014/3/12
We study collusion-resistant traitor tracing in the simple decoder approach, i.e. assignment of scores for each user separately. We introduce a new score function for non-binary bias-based traitor tra...