Fingerprinting codes and the price of approximate differential privacy
We show new lower bounds on the sample complexity of (ε, δ)-differentially private
algorithms that accurately answer large sets of counting queries. A counting query on a …
algorithms that accurately answer large sets of counting queries. A counting query on a …
Achieving accountable and efficient data sharing in industrial internet of things
In this article, we propose an accountable and efficient data sharing scheme for industrial
IoT (IIoT), named an accountable and data sharing scheme (ADS), in which a data owner …
IoT (IIoT), named an accountable and data sharing scheme (ADS), in which a data owner …
Public trace-and-revoke proxy re-encryption for secure data sharing in clouds
Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in
clouds, has been widely studied for decades. PRE allows the proxies to use the re …
clouds, has been widely studied for decades. PRE allows the proxies to use the re …
Traceable secret sharing: Strong security and efficient constructions
Suppose Alice uses at-out-of-n secret sharing to store her secret key on n servers. Her
secret key is protected as long as t of them do not collude. However, what if a less-than-t …
secret key is protected as long as t of them do not collude. However, what if a less-than-t …
Accountability for misbehavior in threshold decryption via threshold traitor tracing
A t-out-of-n threshold decryption system assigns key shares to n parties so that any t of them
can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure …
can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure …
New Techniques for Traitor Tracing: Size and More from Pairings
M Zhandry - Annual International Cryptology Conference, 2020 - Springer
The best existing pairing-based traitor tracing schemes have O (N)-sized parameters, which
has stood since 2006. This intuitively seems to be consistent with the fact that pairings allow …
has stood since 2006. This intuitively seems to be consistent with the fact that pairings allow …
[PDF][PDF] Watermarking language models for many adaptive users
We study watermarking schemes for language models with provable guarantees. As we
show, prior works offer no robustness guarantees against adaptive prompting: when a user …
show, prior works offer no robustness guarantees against adaptive prompting: when a user …
Making Any Attribute-Based Encryption Accountable, Efficiently
J Lai, Q Tang - Computer Security: 23rd European Symposium on …, 2018 - Springer
Attribute-based encryption (ABE) as one of the most interesting multi-recipient public
encryption systems, naturally requires some “tracing mechanisms” to identify misbehaving …
encryption systems, naturally requires some “tracing mechanisms” to identify misbehaving …
Efficient traitor tracing from collusion secure codes
O Billet, DH Phan - International Conference on Information Theoretic …, 2008 - Springer
In this paper, we describe a new traitor tracing scheme which relies on Tardos' collusion
secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black …
secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black …
Policy-based chameleon hash with black-box traceability for redactable blockchain in IoT
P Duan, J Wang, Y Zhang, Z Ma, S Luo - Electronics, 2023 - mdpi.com
Blockchain has become an integral part of various IoT applications, and it has been
successful in boosting performance in various aspects. Applying blockchain as a trust …
successful in boosting performance in various aspects. Applying blockchain as a trust …