{"id":"https://openalex.org/W1999066327","doi":"https://doi.org/10.1145/2810103.2813698","title":"Traitor Deterring Schemes","display_name":"Traitor Deterring Schemes","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1999066327","doi":"https://doi.org/10.1145/2810103.2813698","mag":"1999066327"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813698","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813698","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073753740","display_name":"Aggelos Kiayias","orcid":"https://orcid.org/0000-0003-2451-1430"},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"education","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Aggelos Kiayias","raw_affiliation_strings":["National and Kapodistrian University of Athens, Athens, Greece","National and Kapodistrian University of Athens, #N#Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National and Kapodistrian University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I200777214"]},{"raw_affiliation_string":"National and Kapodistrian University of Athens, #N#Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077863367","display_name":"Qiang Tang","orcid":"https://orcid.org/0000-0002-6153-4255"},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiang Tang","raw_affiliation_strings":["University of Connecticut, Storrs Mansfield, CT, USA","[University of Connecticut, Storrs Mansfield, CT, USA]"],"affiliations":[{"raw_affiliation_string":"University of Connecticut, Storrs Mansfield, CT, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"[University of Connecticut, Storrs Mansfield, CT, USA]","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073753740"],"corresponding_institution_ids":["https://openalex.org/I200777214"],"apc_list":null,"apc_paid":null,"fwci":3.0201,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.92444485,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"231","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/aka","display_name":"AKA","score":0.8302236795425415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8119468688964844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6928076148033142},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6556803584098816},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6392389535903931},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5514526963233948},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5152269005775452},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.46627381443977356},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4595682919025421},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4281318187713623},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12037962675094604}],"concepts":[{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.8302236795425415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8119468688964844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6928076148033142},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6556803584098816},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6392389535903931},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5514526963233948},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5152269005775452},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.46627381443977356},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4595682919025421},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4281318187713623},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12037962675094604},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813698","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813698","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[{"id":"https://openalex.org/G7860639586","display_name":null,"funder_award_id":"CODAMODA","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"}],"funders":[{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W65414435","https://openalex.org/W1481965140","https://openalex.org/W1541829396","https://openalex.org/W1560252361","https://openalex.org/W1577653766","https://openalex.org/W1594802052","https://openalex.org/W1596144702","https://openalex.org/W1596208550","https://openalex.org/W1604454960","https://openalex.org/W1965857274","https://openalex.org/W1976005800","https://openalex.org/W1992282993","https://openalex.org/W2007466965","https://openalex.org/W2018225254","https://openalex.org/W2031722321","https://openalex.org/W2032431003","https://openalex.org/W2052207834","https://openalex.org/W2054904172","https://openalex.org/W2081869611","https://openalex.org/W2089272132","https://openalex.org/W2091915899","https://openalex.org/W2102300387","https://openalex.org/W2123845384","https://openalex.org/W2157679418","https://openalex.org/W2161508639","https://openalex.org/W2296067100","https://openalex.org/W2570008916","https://openalex.org/W3160027900","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6671108768","https://openalex.org/W6697638846"],"related_works":["https://openalex.org/W3014541132","https://openalex.org/W2994737807","https://openalex.org/W2948639032","https://openalex.org/W2948704552","https://openalex.org/W2948403110","https://openalex.org/W3156494719","https://openalex.org/W2909288185","https://openalex.org/W2948123712","https://openalex.org/W2101387633","https://openalex.org/W767161385"],"abstract_inverted_index":{"We":[0],"put":[1],"forth":[2],"a":[3,8,16,28,36,52,63,116],"new":[4],"cryptographic":[5],"primitive":[6],"called":[7],"Traitor":[9],"Deterring":[10],"Scheme":[11],"(TDS).":[12],"A":[13],"TDS":[14,37,117],"is":[15,38],"multi-recipient":[17],"public-key":[18],"encryption":[19],"scheme":[20],"where":[21],"an":[22,71],"authority":[23],"issues":[24],"decryption":[25,75],"keys":[26],"to":[27,85,98,110],"set":[29],"of":[30,35,54,66,79,90],"users.":[31,122],"The":[32,56],"distinguishing":[33],"feature":[34],"that":[39,61],"secret-keys":[40],"are":[41,108],"issued":[42],"only":[43,95],"after":[44],"the":[45,80,91,99,102],"users":[46,67],"provide":[47],"some":[48],"private":[49],"information":[50],"as":[51],"form":[53],"collateral.":[55],"traitor":[57],"deterring":[58],"property":[59],"ensures":[60],"if":[62],"malicious":[64,119],"coalition":[65],"(aka":[68,73],"\"traitors\")":[69],"produces":[70],"unauthorized":[72],"\"pirate\")":[74],"device,":[76],"any":[77],"recipient":[78],"device":[81],"will":[82],"be":[83],"able":[84],"recover":[86],"at":[87],"least":[88],"one":[89],"traitors'":[92],"collaterals":[93,107],"with":[94],"black-box":[96],"access":[97],"device.":[100],"On":[101],"other":[103],"hand,":[104],"honest":[105],"users'":[106],"guaranteed":[109],"remain":[111],"hidden.":[112],"In":[113],"this":[114],"fashion":[115],"deincentivizes":[118],"behavior":[120],"among":[121]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
