Filters








235 Hits in 2.1 sec

Efficient Traitor Tracing Algorithms Using List Decoding [chapter]

Alice Silverberg, Jessica Staddon, Judy L. Walker
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors.  ...  We produce schemes for which the TA algorithm is very fast. The IPP tracing algorithm, though less efficient, can list all coalitions capable of constructing a given pirate.  ...  The authors thank Gui-Leng Feng, Tom Høholdt, Ralf Kötter, and Madhu Sudan for useful conversations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45682-1_11">doi:10.1007/3-540-45682-1_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nepsczcfpzctdd57r4stwlndpm">fatcat:nepsczcfpzctdd57r4stwlndpm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030095242/https://link.springer.com/content/pdf/10.1007%2F3-540-45682-1_11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/09/dc092892c8bf00dcb3136ff5cd7c7fbafe58b775.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45682-1_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Applications of list decoding to tracing traitors

A. Silverberg, J. Staddon, J.L. Walker
<span title="">2003</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/niovmjummbcwdg4qshgzykkpfu" style="color: black;">IEEE Transactions on Information Theory</a> </i> &nbsp;
We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates  ...  We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evidence that when using an algebraic structure, the ability to trace traitors with the IPP algorithm implies  ...  An additional advantage of using list decoding is that the associated traitor tracing algorithm gives a list containing one or more traitors, rather than only one.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tit.2003.810630">doi:10.1109/tit.2003.810630</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p7zwver565hifban5ey7e247vi">fatcat:p7zwver565hifban5ey7e247vi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100616080808/http://mobius.unl.edu/~jwalker7/papers/taipp.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/3f/ff3fcd876357dbfa76c8e5f6c10cce094ecd35cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tit.2003.810630"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates [chapter]

Tatsuyuki Matsushita, Hideki Imai
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
to construct a sublinear black-box traitor tracing scheme that can detect efficiently at least one traitor (who builds the pirate decoder) with overwhelming probability, although a tracing algorithm that  ...  In this paper, we answer affirmatively the above question by presenting a concrete construction of a public-key black-box tracing scheme in which the known tracing algorithm can be used while keeping the  ...  In order to identify efficiently traitors from the pirate decoder with the reaction mechanism, it is necessary that a tracing algorithm can decide at least one traitor immediately when the reaction is  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30539-2_19">doi:10.1007/978-3-540-30539-2_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bmymrfv7evepvmkdzslowtaeua">fatcat:bmymrfv7evepvmkdzslowtaeua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502035157/https://link.springer.com/content/pdf/10.1007%2F978-3-540-30539-2_19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/30/f1/30f10ca5d16f865b8b78daaa0006980f3c16a2c2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30539-2_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Traitor Tracing Scheme Based on RSA for Fast Decryption [chapter]

John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In addition, unlike previous traitor tracing schemes, the proposed scheme employs the widely deployed RSA algorithm.  ...  Also, the scheme prevents innocent users from being framed as traitors. The proposed scheme improves upon the decryption efficiency of past traitor tracing proposals.  ...  Using the clear-box tracing algorithm, we can always efficiently identify at least one of the traitors who contributed to a pirate decoder. Second, we present a limited "black-box" tracing algorithm.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11496137_5">doi:10.1007/11496137_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odmxaynh4zfzhomg34c77dbyku">fatcat:odmxaynh4zfzhomg34c77dbyku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060427062957/http://palms.ee.princeton.edu:80/PALMSopen/mcgregor05traitortracing_springer.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/93/7f93e8f9471fb2a7d21355f7f22803de88cf5d6f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11496137_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Page 6511 of Mathematical Reviews Vol. , Issue 2003h [page]

<span title="">2003</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
traitor tracing algorithms using list decoding.  ...  Summary: “We use powerful new techniques for list decoding error-correcting codes to efficiently trace traitors.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2003-08_2003h/page/6511" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2003-08_2003h/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key [chapter]

Ryo Nishimaki, Daniel Wichs, Mark Zhandry
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We first survey the prior work on traitor tracing and then present our new results and techniques that allow us to achieve the above goals.  ...  to trace the identities of traitors.  ...  A traitor-tracing scheme ensures that no such strategy can succeed -there is an efficient tracing algorithm which is given black-box access to any such pirate decoder and is guaranteed to output the numeric  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49896-5_14">doi:10.1007/978-3-662-49896-5_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/27salazrlzbqxmt5b3a24bohxy">fatcat:27salazrlzbqxmt5b3a24bohxy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150920093203/https://crypto.stanford.edu/~zhandry/docs/papers/AnonTT.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/5e/b85e32d5fdb37ff5a12c6820c4ddf06dc16cf0c6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49896-5_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A class of I.P.P. codes with efficient identification

Alexander Barg, Gregory Kabatiansky
<span title="">2004</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hhnp3o4qcjfyfd4gpifcdou6ui" style="color: black;">Journal of Complexity</a> </i> &nbsp;
Tracing traitors This section is devoted to an application of the above result to the ''tracing traitors problem'' [7, 8] .  ...  a vector v i AP V ðy i Þ: Form a vector z ¼ ðz 1 ; z 2 ; y; z N ÞAF N Q ; where z i ¼ f À1 ðv i Þ: * Outer decoding: Decode z with the code W using the reduced GS algorithm producing the list Y z ðN=tÞ  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jco.2003.08.012">doi:10.1016/j.jco.2003.08.012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4z2eq44755dy3ptumci4xmdazy">fatcat:4z2eq44755dy3ptumci4xmdazy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171004164019/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/e31/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMDg4NTA2NHgwMzAwMTE5NQ%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/82/1e820df3268ad2bddcd6170e32b888e6a87d2f0e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jco.2003.08.012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model [chapter]

Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
An efficient construction for such a scheme will provide a useful solution to the public key traitor tracing problem". As far as we know, this problem is still open.  ...  there exists an efficient public key traitor tracing scheme that is completely collusion resistant.  ...  The most efficient black box traitor tracing are code based schemes [15, 2, 8, 17] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-38553-7_8">doi:10.1007/978-3-642-38553-7_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ga7rmbl6onefhadcxijydhkiua">fatcat:ga7rmbl6onefhadcxijydhkiua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809012256/http://www.di.ens.fr/users/phan/2013_africa_2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/e2/bae25caf5ad136ab0eda84a66f260d2f15981014.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-38553-7_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Page 5113 of Mathematical Reviews Vol. , Issue 2004f [page]

<span title="">2004</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
The main contribution of this paper is speeding up the traitor tracing algorithms. For this purpose the authors apply the list decoding algorithms to TA codes.  ...  to tracing traitors.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2004-06_2004f/page/5113" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2004-06_2004f/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Traitors Collaborating in Public: Pirates 2.0 [chapter]

Olivier Billet, Duong Hieu Phan
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We give a few landmarks of the work in traitor tracing but this list is of course not exhaustive.  ...  These are not exactly traitor tracing schemes, but rather very efficient broadcast encryption schemes with some black-box tracing abilities.  ...  f i } used by the traitors to gain additional information and to trace the traitors.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-01001-9_11">doi:10.1007/978-3-642-01001-9_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ra6ad3bmnfbc5hbmlwx5ym7zji">fatcat:ra6ad3bmnfbc5hbmlwx5ym7zji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190505042135/https://link.springer.com/content/pdf/10.1007%2F978-3-642-01001-9_11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/63/dc/63dc0c3c1a5859de49b071ddf81312ea0af814e4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-01001-9_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet [chapter]

Thach V. Bui, Oanh K. Nguyen, Van H. Dang, Nhung T. H. Nguyen, Thuc D. Nguyen
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This problem is called traitor tracing. To the best of our knowledge, this is the first result that raises a variant of NAGT and gets how to trace traitors without using probability.  ...  Given an unknown string x ∈ {0, 1} N with at most d ones, the problem is how to determine xi = 1 using as few tests as possible so that x can be decoded as fast as possible.  ...  Traitor tracing is very useful in systems which have pirated users. Group testing, list decoding and traitor tracing have a strong relationship. In 2010, Indyk P., Ngo H.Q. and Rudra A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36818-9_35">doi:10.1007/978-3-642-36818-9_35</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yu52345tfbbwln3thy26xyjv7u">fatcat:yu52345tfbbwln3thy26xyjv7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725215208/https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_35.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/95/dc95f0a6ca5410dc4fa4835725cc25ba0353d180.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36818-9_35"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Improving the Boneh-Franklin Traitor Tracing Scheme [chapter]

Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Secondly, we exhibit the lack of practical value of list-decoding algorithms to identify more than k traitors.  ...  Finally, the low efficiency of tracing procedures in traitor tracing schemes has been addressed by Silverberg et al. in [37, 38] .  ...  List Decoding and Traitor Tracing In this section we have a closer look at the various parameters of of the Guruswami-Sudan algorithm.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00468-1_6">doi:10.1007/978-3-642-00468-1_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/adnhpwi2nbejvoder6k2okqkdy">fatcat:adnhpwi2nbejvoder6k2okqkdy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090115213502/http://eprint.iacr.org/2008/384.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/7e/f07e750e1a7ef214cd5a9dce872d785eefe54188.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00468-1_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Tracing traitors

B. Chor, A. Fiat, M. Naor, B. Pinkas
<span title="">2000</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/niovmjummbcwdg4qshgzykkpfu" style="color: black;">IEEE Transactions on Information Theory</a> </i> &nbsp;
be used against decoders which succeed in decryption with probability greater than some threshold.  ...  We describe fully resilient schemes which can be used against any decoder which decrypts with nonnegligible probability.  ...  tracing algorithm, used upon confiscation of a pirate decoder, to determine the identity of a traitor.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/18.841169">doi:10.1109/18.841169</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o4kzrqsxczdhrf7mc3slchmscq">fatcat:o4kzrqsxczdhrf7mc3slchmscq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706091733/http://www.wisdom.weizmann.ac.il/%7Enaor/PAPERS/tracing_traitors.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/cd/becddb754d41fa2055be5d50eac0cade5b4004ce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/18.841169"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Sequential Traitor Tracing [chapter]

Reihaneh Safavi-Naini, Yejing Wang
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We consider the same scenario as Fiat and Tassa and propose a new type of traceability scheme, called sequential traitor tracing, that can efficiently detect all traitors and does not require any real-time  ...  Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to rebroadcast the content after it is decrypted.  ...  They proved that for tracing p traitors in any traceability system at least p + 1 versions must be used, and gave algorithms that used p + 1 and 2p + 1 versions and required O(3 p p log n) and O(p log  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44598-6_20">doi:10.1007/3-540-44598-6_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4gzldvcfkneqnjk4a2z2jhdbs4">fatcat:4gzldvcfkneqnjk4a2z2jhdbs4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724103716/https://link.springer.com/content/pdf/10.1007%2F3-540-44598-6_20.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/6c/c06c2fcf1affa2c949cdbf2ba85bccde4720dfb3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44598-6_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Self Protecting Pirates and Black-Box Traitor Tracing [chapter]

Aggelos Kiayias, Moti Yung
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a new generic black-box traitor tracing model in which the pirate-decoder employs a self-protection technique.  ...  We constructively prove that any system that fails this condition, is incapable of tracing pirate-decoders that contain keys based on a superlogarithmic number of traitor keys.  ...  In the [KD98] -scheme, Single-query Black-box confirmation is impossible against a pirate decoder which includes t(n) = ω(log n) traitor keys, unless the probability that a user is a suspect given that  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44647-8_4">doi:10.1007/3-540-44647-8_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3yh7cjy6ezasnc56lglvkmbc2a">fatcat:3yh7cjy6ezasnc56lglvkmbc2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502144940/https://link.springer.com/content/pdf/10.1007%2F3-540-44647-8_4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/0c/440c01675a850411c577aeead8b2a0f95224ff88.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44647-8_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 235 results