On the tracing traitors math: Dedicated to the memory of bob blakley - Pioneer of digital fingerprinting and inventor of secret sharing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We give an overview of the most important mathematical results related to different types of tracing traitors schemes, or schemes with identifiable parent property, especially for the case when the scheme’s “length” goes to infinity.

Original languageEnglish
Title of host publicationCodes, Cryptology and Information Security - 3rd International Conference, C2SI 2019, Proceeding
EditorsAbderrahmane Nitaj, El Mamoun Souidi, Sylvain Guilley, Claude Carlet
PublisherSpringer Verlag
Pages371-380
Number of pages10
ISBN (Print)9783030164577
DOIs
Publication statusPublished - 2019
Event3rd International Conference on Codes, Cryptology and Information Security, C2SI 2019 - Rabat, Morocco
Duration: 22 Apr 201924 Apr 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11445 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Codes, Cryptology and Information Security, C2SI 2019
Country/TerritoryMorocco
CityRabat
Period22/04/1924/04/19

Fingerprint

Dive into the research topics of 'On the tracing traitors math: Dedicated to the memory of bob blakley - Pioneer of digital fingerprinting and inventor of secret sharing'. Together they form a unique fingerprint.

Cite this