Login / Signup

Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.

Caroline FontaineSébastien GambsJulien LoliveCristina Onete
Published in: LATINCRYPT (2014)
Keyphrases
  • lightweight
  • dynamic programming
  • worst case
  • optimal design
  • metadata
  • optimal solution
  • optimal control
  • digital content
  • formal analysis
  • cryptographic protocols
  • network protocols
  • homomorphic encryption