搜索结果: 1-3 共查到“计算机科学技术 Tracing”相关记录3条 . 查询时间(0.076 秒)
Barriers to Black-Box Constructions of Traitor Tracing Systems
two-party computation Secure Multiparty Computation
2015/12/21
Reducibility between different cryptographic primitives is a fundamental problem in modern
cryptography. As one of the primitives, traitor tracing systems help content distributors recover
the ident...
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present the first traitor tracing system where ciphertext size is "co...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Multiparty Key Exchange Effi cient Traitor Tracing
2015/8/5
Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys,
and public key. Ciphertext size is logarithmic in the number of users and secret key size is
independent ...