Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation

D Boneh, M Zhandry - Algorithmica, 2017 - Springer
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …

Fully collusion resistant traitor tracing with short ciphertexts and private keys

D Boneh, A Sahai, B Waters - … International Conference on the Theory and …, 2006 - Springer
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts
and constant size private keys. More precisely, let N be the total number of users. Our …

A fully collusion resistant broadcast, trace, and revoke system

D Boneh, B Waters - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is
sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke …

A public-key traitor tracing scheme with revocation using dynamic shares

WG Tzeng, ZJ Tzeng - … Key Cryptography: 4th International Workshop on …, 2001 - Springer
We proposed a new public-key traitor tracing scheme with revocation capability using the
dynamic share and entity revocation techniques. The enabling block of our scheme is …

Traitor tracing with constant size ciphertext

D Boneh, M Naor - Proceedings of the 15th ACM conference on …, 2008 - dl.acm.org
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the
secret keys used to create the box. We present a traitor tracing system where ciphertext size …

Building efficient fully collusion-resilient traitor tracing and revocation schemes

S Garg, A Kumarasubramanian, A Sahai… - Proceedings of the 17th …, 2010 - dl.acm.org
In [8, 9] Boneh et al. presented the first fully collusion-resistant traitor tracing and trace &
revoke schemes. These schemes are based on composite order bilinear groups and their …

Hardness of k-LWE and Applications in Traitor Tracing

S Ling, DH Phan, D Stehlé, R Steinfeld - Algorithmica, 2017 - Springer
We introduce the k-LWE LWE problem, a Learning With Errors variant of the k-SIS problem.
The Boneh-Freeman reduction from SIS to k-SIS suffers from an exponential loss in k. We …

Post-quantum identity-based traitor tracing

Z Yang, D He, R Chen, S Wang, J Xu - Journal of Information Security and …, 2024 - Elsevier
In the distribution of digital content, users may collude and utilize their secret keys to create
pirate decoders which enable illegally users to receive the same service. As a useful …

Breaking and repairing asymmetric public-key traitor tracing

A Kiayias, M Yung - ACM Workshop on Digital Rights Management, 2002 - Springer
Traitor tracing schemes are a very useful tool for preventing piracy in digital content
distribution systems. A traitor tracing procedure allows the system-manager to reveal the …

Risky traitor tracing and new differential privacy negative results

R Goyal, V Koppula, A Russell, B Waters - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
In this work we seek to construct collusion-resistant traitor tracing systems with small
ciphertexts from standard assumptions that also move toward practical efficiency. In our …