Cryptology ePrint Archive: Report 2013/642
Available versions in chronological order
20131010:145101 (posted 10-Oct-2013 14:51:01 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20131011:175312 (posted 11-Oct-2013 17:53:12 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20131016:042124 (posted 16-Oct-2013 04:21:24 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20131016:220222 (posted 16-Oct-2013 22:02:22 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20131206:165655 (posted 06-Dec-2013 16:56:55 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20140125:010447 (posted 25-Jan-2014 01:04:47 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20140212:182017 (posted 12-Feb-2014 18:20:17 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20140214:232031 (posted 14-Feb-2014 23:20:31 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
20140616:201124 (posted 16-Jun-2014 20:11:24 UTC)
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
Original publication (with major differences): IACR-CRYPTO-2014
[
Cryptology ePrint archive
]