Cancer aided by greasy traitors

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracing Traitors

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...

متن کامل

Trials of Traced Traitors

Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...

متن کامل

Recent Developments in Tracing Traitors

In 2000 and 2001, Chor and Fiat etc. published two papers, [2] and [4], which can trace traitors who redistribute keys and cleartext respectively. These schemes, however, have some vulnerable points such as high real-time computation in [4]. In this five year, the two kinds of schemes have been published to improve performance, which are sequential and RSA based. This paper would focus on compa...

متن کامل

Resisting Traitors in Linkable Democratic Group Signatures

Linkable democratic group signatures (LDGS) [29] allow every member of a group to trace the identity of any other member who issued a signature while non-members (with the help of unique pseudonyms) are only able to link the signatures issued by the same signer without being able to trace the signer’s identity. LDGS avoid centralized management authorities (group managers) and grant each group ...

متن کامل

Traitors Collaborating in Public: Pirates 2.0

This work introduces a new concept of attack against traitor tracing schemes. We call attacks of this type Pirates 2.0 attacks as they result from traitors collaborating together in a public way. In other words, traitors do not secretly collude but display part of their secret keys in a public place; pirate decoders are then built from this public information. The distinguishing property of Pir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 2021

ISSN: 0028-0836,1476-4687

DOI: 10.1038/d41586-021-00421-4