Back to Results
First PageMeta Content
Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability


Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†
Add to Reading List

Document Date: 2006-12-04 09:17:42


Open Document

File Size: 330,38 KB

Share Result on Facebook

Company

RSA Laboratories / /

Country

United States / /

/

Facility

University of Connecticut / Columbia University / /

Holiday

Assumption / /

IndustryTerm

decryption algorithm / software obfuscation / traitor-tracing algorithm / probabilistic algorithm / traceability algorithm / decryption device / /

MarketIndex

case 25 / /

Organization

Columbia University / National Science Foundation / University of Connecticut / /

Position

formal model for black-box traceability / /

Product

Quadratic Residuosity / /

ProgrammingLanguage

C / /

ProvinceOrState

Connecticut / /

Technology

encryption / sampling algorithm / encryption system / multi-recipient encryption / regular ElGamal encryption / traitor-tracing algorithm / traceability algorithm / private key / copyrighted public-key encryption / underlying 2-user encryption / ElGamal-like encryption / decryption algorithm / public-key encryption / bulk data encryption / ElGamal encryption / probabilistic algorithm / /

SocialTag