Fingerprinting codes and the price of approximate differential privacy

M Bun, J Ullman, S Vadhan - Proceedings of the forty-sixth annual ACM …, 2014 - dl.acm.org
We show new lower bounds on the sample complexity of (ε, δ)-differentially private
algorithms that accurately answer large sets of counting queries. A counting query on a …

Achieving accountable and efficient data sharing in industrial internet of things

C Huang, D Liu, J Ni, R Lu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, we propose an accountable and efficient data sharing scheme for industrial
IoT (IIoT), named an accountable and data sharing scheme (ADS), in which a data owner …

Public trace-and-revoke proxy re-encryption for secure data sharing in clouds

F Luo, H Wang, W Susilo, X Yan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in
clouds, has been widely studied for decades. PRE allows the proxies to use the re …

Traceable secret sharing: Strong security and efficient constructions

D Boneh, A Partap, L Rotem - Annual International Cryptology Conference, 2024 - Springer
Suppose Alice uses at-out-of-n secret sharing to store her secret key on n servers. Her
secret key is protected as long as t of them do not collude. However, what if a less-than-t …

Accountability for misbehavior in threshold decryption via threshold traitor tracing

D Boneh, A Partap, L Rotem - Annual International Cryptology Conference, 2024 - Springer
A t-out-of-n threshold decryption system assigns key shares to n parties so that any t of them
can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure …

New Techniques for Traitor Tracing: Size and More from Pairings

M Zhandry - Annual International Cryptology Conference, 2020 - Springer
The best existing pairing-based traitor tracing schemes have O (N)-sized parameters, which
has stood since 2006. This intuitively seems to be consistent with the fact that pairings allow …

[PDF][PDF] Watermarking language models for many adaptive users

A Cohen, A Hoover, G Schoenbach - 2025 IEEE Symposium on …, 2024 - axhoover.com
We study watermarking schemes for language models with provable guarantees. As we
show, prior works offer no robustness guarantees against adaptive prompting: when a user …

Making Any Attribute-Based Encryption Accountable, Efficiently

J Lai, Q Tang - Computer Security: 23rd European Symposium on …, 2018 - Springer
Attribute-based encryption (ABE) as one of the most interesting multi-recipient public
encryption systems, naturally requires some “tracing mechanisms” to identify misbehaving …

Efficient traitor tracing from collusion secure codes

O Billet, DH Phan - International Conference on Information Theoretic …, 2008 - Springer
In this paper, we describe a new traitor tracing scheme which relies on Tardos' collusion
secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black …

Policy-based chameleon hash with black-box traceability for redactable blockchain in IoT

P Duan, J Wang, Y Zhang, Z Ma, S Luo - Electronics, 2023 - mdpi.com
Blockchain has become an integral part of various IoT applications, and it has been
successful in boosting performance in various aspects. Applying blockchain as a trust …