In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate has been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be built from sub-keys of users. The key notion in Pirates 2.0 is the anonymity level of traitors: they can rest assured to remain anonymous when each of them only contributes a very small fraction of its secret information. This scenario encourages dishonest users to participate in collusion and the size of collusion could become very large, possibly beyond the considered threshold in the classical model. There are numerous attempts to ...
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defen...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in...
Abstract. This work introduces a new concept of attack against traitor tracing schemes. We call atta...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
International audienceLeakage-resilient cryptography aims at capturing side-channel attacks within t...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
International audienceLeakage-resilient cryptography aims at developing new algorithms for which phy...
Leakage-resilient cryptography aims at developing new algorithms for which physical security against...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
Consider a digital content owner who wants to distribute the content to a receiver population while ...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defen...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in...
Abstract. This work introduces a new concept of attack against traitor tracing schemes. We call atta...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
International audienceLeakage-resilient cryptography aims at capturing side-channel attacks within t...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
International audienceLeakage-resilient cryptography aims at developing new algorithms for which phy...
Leakage-resilient cryptography aims at developing new algorithms for which physical security against...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
Consider a digital content owner who wants to distribute the content to a receiver population while ...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defen...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in...