Now showing items 1-2 of 2
Optimization techniques and new methods for boradcast encryption and traitor tracing schemes
(Bilkent University, 2012)
In the last few decades, the use of digital content increased dramatically. Many forms of digital products in the form of CDs, DVDs, TV broadcasts, data over the Internet, entered our life. Classical cryptography, where ...
Optimal broadcasting encryption with free riders
(Bilkent University, 2006)
Broadcast encryption schemes allow a center to broadcast encrypted messages so that each particular message can only be decrypted by a set of privileged receivers designated for it. The standard technique is to distribute ...