Traitor tracing

Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2016
0204019962016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
In this work, we show how to use indistinguishability obfuscation to build multiparty key exchange, efficient broadcast… (More)
  • figure 7
  • figure 12
  • figure 14
  • figure 16
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box… (More)
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Traitor tracing schemes were introduced to combat the typical piracy scenario whereby pirate decoders (or access control… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2001
2001
We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and… (More)
Is this relevant?
2000
2000
The notion of t rai tor tracing was introduced by Chor, Fiat and Naor, in order to combat piracy scenarios. Recently, Fiat and… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A traceability scheme is a broadcast encryption scheme such that a data supplier T can trace malicious authorized users (traitors… (More)
Is this relevant?