Cancer aided by greasy traitors
نویسندگان
چکیده
منابع مشابه
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...
متن کاملTrials of Traced Traitors
Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...
متن کاملRecent Developments in Tracing Traitors
In 2000 and 2001, Chor and Fiat etc. published two papers, [2] and [4], which can trace traitors who redistribute keys and cleartext respectively. These schemes, however, have some vulnerable points such as high real-time computation in [4]. In this five year, the two kinds of schemes have been published to improve performance, which are sequential and RSA based. This paper would focus on compa...
متن کاملResisting Traitors in Linkable Democratic Group Signatures
Linkable democratic group signatures (LDGS) [29] allow every member of a group to trace the identity of any other member who issued a signature while non-members (with the help of unique pseudonyms) are only able to link the signatures issued by the same signer without being able to trace the signer’s identity. LDGS avoid centralized management authorities (group managers) and grant each group ...
متن کاملTraitors Collaborating in Public: Pirates 2.0
This work introduces a new concept of attack against traitor tracing schemes. We call attacks of this type Pirates 2.0 attacks as they result from traitors collaborating together in a public way. In other words, traitors do not secretly collude but display part of their secret keys in a public place; pirate decoders are then built from this public information. The distinguishing property of Pir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2021
ISSN: 0028-0836,1476-4687
DOI: 10.1038/d41586-021-00421-4