A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
On the security of a public-key traitor tracing scheme with sublinear ciphertext size
2009
Proceedings of the nineth ACM workshop on Digital rights management - DRM '09
Traitor tracing refers to a class of encryption schemes that can be used to deter key-leakage. They apply to a setting that involves many receivers, each one receiving a fingerprinted decryption key. If a set of malicious receivers (also known as traitors) constructs an illicit decoder then a tracing mechanism enables an authority to identify at least one of the traitors. The very first traitor tracing scheme that has sublinear ciphertext size and is capable of tracing unambiguously illicit
doi:10.1145/1655048.1655050
dblp:conf/drm/KiayiasP09
fatcat:e5jxh63zlbgrtd2wm6oc7swtf4