C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Aggelos Kiayias
Moti Yung
Published in:
Digital Rights Management Workshop (2008)
Keyphrases
</>
extended abstract
public key
provably secure
security analysis
security model
image authentication
real time
digital signature
authentication scheme
elliptic curve cryptography
cost effective
secret key
public key cryptosystem
partially blind signature scheme