搜索结果: 1-2 共查到“计算机处理器技术 Tracing”相关记录2条 . 查询时间(0.095 秒)
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present the first traitor tracing system where ciphertext size is "co...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Multiparty Key Exchange Effi cient Traitor Tracing
2015/8/5
Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys,
and public key. Ciphertext size is logarithmic in the number of users and secret key size is
independent ...