International audienceTrace and revoke systems allow for the secure distribution of digital content in such a way that malicious users, who collude to produce pirate decoders, can be traced back and revoked from the system. In this paper, we consider such schemes in the identity-based setting, by extending the model of identity-based traitor tracing scheme by Abdalla et al. to support revocation.The proposed constructions rely on the subset cover framework. We first propose a generic construction which transforms an identity-based encryption with wildcard (WIBE) of depth log(N) (N being the number of users) into an identity-based trace and revoke scheme by relying on the complete subtree framework (of depth log(N)). This leads, however, to ...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Consider a digital content owner who wants to distribute the content to a receiver population while ...
International audienceWe address the problem of designing an efficient broadcast encryption scheme w...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
Our goal is to design encryption schemes for mass distribution of data that enable to (1) deter user...
In this paper we study the design of efficient trace-revoke schemes for content protection. In state...
Abstract We deal with the problem of a center sending a message to a group of users such that some s...
We deal with the problem of a center sending a message to a group of users such that some subset of ...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
Abstract. Traitor Tracing Schemes constitute a very useful tool against piracy in the context of dig...
To overcome the piracy problem in digital content distribution systems, a number of traitor tracing ...
In a traitor tracing scheme, each user is given a different decryption key. A content distributor ca...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Consider a digital content owner who wants to distribute the content to a receiver population while ...
International audienceWe address the problem of designing an efficient broadcast encryption scheme w...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
Our goal is to design encryption schemes for mass distribution of data that enable to (1) deter user...
In this paper we study the design of efficient trace-revoke schemes for content protection. In state...
Abstract We deal with the problem of a center sending a message to a group of users such that some s...
We deal with the problem of a center sending a message to a group of users such that some subset of ...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
Abstract. Traitor Tracing Schemes constitute a very useful tool against piracy in the context of dig...
To overcome the piracy problem in digital content distribution systems, a number of traitor tracing ...
In a traitor tracing scheme, each user is given a different decryption key. A content distributor ca...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...