搜索结果: 1-6 共查到“军事学 Traitor Tracing Scheme”相关记录6条 . 查询时间(0.361 秒)
Efficient Fully Collusion-Resilient Traitor Tracing Scheme
Fully Collusion-Resilient Traitor Tracing Scheme
2009/11/18
At Eurocrypt 2006, Boneh et al. [1] presented a fully collusion-resistant traitor tracing scheme.
Their scheme is based on composite order bilinear groups, and its security depends on the hardness
o...
Improving the Boneh-Franklin Traitor Tracing Scheme
Boneh-Franklin traitor tracing Reed-Solomon codes Berlekamp-Massey algorithm
2009/6/9
Traitor tracing schemes are cryptographically secure broadcast methods that allow identification
of conspirators: if a pirate key is generated by k traitors out of a static set of ℓ legitimate
...
An Attack on A Traitor Tracing Scheme
Security black-box traitor tracing copyright protection
2009/4/16
In Crypto’99, Boneh and Franklin proposed a public key
traitor tracing scheme [1], which was believed to be able to catch all
traitors while not accusing any innocent users (i.e., full-tracing and e...
On a Traitor Tracing Scheme from ACISP 2003.
Traitor tracing scheme with constant ciphertext rate against powerful pirates
piracy watermarking collusion secure codes
2008/12/26
Traitor tracing schemes are used to fight piracy when distributing securely some
data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate ...
Fully Resilient Traitor Tracing Scheme using Key Update
Fully Resilient Traitor Tracing Scheme Key Update
2008/6/3
This paper proposes fully resilient traitor tracing schemes which have no
restriction about the number of traitors. By using the concept of key update, the
schemes can make the pirate decoders usele...