all InfoSec news
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction
Nov. 3, 2023, 1:54 a.m. |
IACR News www.iacr.org
ePrint Report: Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction
Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang
In Crypto 94, Chor, Fiat, and Naor first introduced the traitor tracing (TT) systems, which aim at helping content distributors identify pirates. Since its introduction, many traitor tracing schemes have been proposed. However, we observe until now almost all the traitor tracing systems using probabilistic public key (and secret key) encryption as the the content distribution algorithm, they …
aim attackers construction crypto eprint report helping identify introduction pan pirates report security stronger systems tracing wang
More from www.iacr.org / IACR News
Regev Factoring Beyond Fibonacci: Optimizing Prefactors
1 day, 6 hours ago |
www.iacr.org
NTRU-based FHE for Larger Key and Message Space
1 day, 6 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Data & Security Engineer Lead
@ LiquidX | Singapore, Central Singapore, Singapore
IT and Cyber Risk Control Lead
@ GXS Bank | Singapore - OneNorth
Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F
@ Hifield | Sèvres, France
Cyber Security Analyst (Weekend 1st Shift)
@ Fortress Security Risk Management | Cleveland, OH, United States
Senior Manager, Cybersecurity
@ BlueTriton Brands | Stamford, CT, US