ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. The main advantage of elliptic curves systems is thus their high cryptographic strength relative to the size of t...
Main Author: | Ali M. Sagheer |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Anbar
2008-04-01
|
Series: | مجلة جامعة الانبار للعلوم الصرفة |
Subjects: | |
Online Access: | https://juaps.uoanbar.edu.iq/article_15446_215f3095a8650320aa127e5f02c96423.pdf |
Similar Items
Collusion-free public-key traitor tracing scheme
by: WANG Qing-long1, et al.
Published: (2006-01-01)
by: WANG Qing-long1, et al.
Published: (2006-01-01)
Similar Items
-
Hardness of k-LWE and Applications in Traitor Tracing
by: Ling, San, et al.
Published: (2017) -
Collusion-free public-key traitor tracing scheme
by: WANG Qing-long1, et al.
Published: (2006-01-01) -
Collusion-free public-key traitor tracing scheme
by: WANG Qing-long1, et al.
Published: (2006-01-01) -
Toward Practical Deep Blind Watermarking for Traitor Tracing
by: Bosung Yang, et al.
Published: (2023-01-01) -
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
by: Md Nizam Udin, et al.
Published: (2021-05-01)