Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Traitor Tracing Schemes - Eurocrypt 2023 Session

TheIACR via YouTube

Overview

Explore a comprehensive session from Eurocrypt 2023 focused on Traitor Tracing Schemes. Delve into the motivation behind broadcast, trace, and revoke systems, examining their goals and prior work in public and secret traceability. Investigate the assumptions and building blocks for these schemes, comparing public-key and secret-key approaches. Learn about revocable predicate encryption, secret key RPE, and optimal parameters. Gain insights into traitor tracing syntax, security, and schemes with optimal sizes, including those based on pairing. Discover the connections between revocable PLBE and traitor tracing, as well as attribute-based functional encryption. Conclude by addressing adaptive security and considering open questions in the field.

Syllabus

Intro
Motivation
Broadcast, Trace and Revoke: Goals
Prior Work: Public Traceability
Public Traceability: Assumptions
Building Blocks
Prior Work: Secret Traceability
Secret Traceability: Assumptions
Public-Key vs Secret-Key BTR
Revocable Predicate Encryption[Kw19]
Secret Key RPE: Outline
Secret Key RPE: Optimal Parameters
Summary
Traitor Tracing [CFN94]
Traitor Tracing: Syntax
Traitor Tracing: Security
Traitor Tracing Schemes with Optimal Sizes
Existing Traitor Tracing Schemes from Pairing
Traitor Tracing from Pairing: Trade-Off Simplices
Revocable PLBE and Traitor Tracing
Attribute-Based Functional Encryption
AB-FE: Functional Encryption Part
One More Thing: Adaptive Security
Open Questions

Taught by

TheIACR

Reviews

Start your review of Traitor Tracing Schemes - Eurocrypt 2023 Session

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.