Overview
Syllabus
Intro
Motivation
Broadcast, Trace and Revoke: Goals
Prior Work: Public Traceability
Public Traceability: Assumptions
Building Blocks
Prior Work: Secret Traceability
Secret Traceability: Assumptions
Public-Key vs Secret-Key BTR
Revocable Predicate Encryption[Kw19]
Secret Key RPE: Outline
Secret Key RPE: Optimal Parameters
Summary
Traitor Tracing [CFN94]
Traitor Tracing: Syntax
Traitor Tracing: Security
Traitor Tracing Schemes with Optimal Sizes
Existing Traitor Tracing Schemes from Pairing
Traitor Tracing from Pairing: Trade-Off Simplices
Revocable PLBE and Traitor Tracing
Attribute-Based Functional Encryption
AB-FE: Functional Encryption Part
One More Thing: Adaptive Security
Open Questions
Taught by
TheIACR