In this paper, we describe a new traitor tracing scheme which relies on Tardos’ collusion secure ... more In this paper, we describe a new traitor tracing scheme which relies on Tardos’ collusion secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black-box tracing procedure against pirates that are allowed to decrypt with some (possibly high) error rate while keeping the decoders of the lowest possible size when using collusion secure codes, namely of size proportional to the length of Tardos’ code.
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in t... more We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters’ identity-based encryption scheme.
In this paper the use of an accelerometer to measure cardio-respiratory activity is presented. Mo... more In this paper the use of an accelerometer to measure cardio-respiratory activity is presented. Movement of the chest was recorded by an accelerometer attached to a belt around the chest. The acquisition is realized in different status: normal, apnea, deep breathing or after exhaustion and also in different postures: vertical (sitting, standing) or horizontal (lying down). The resulting signal was compared with reference measurements. The results of experimental evaluation indicate that using a chest-accelerometer can correctly detect the respiratory waveform and heart rate (HR) signal. This method is therefore suitable for automatic identification some disease, for example arrhythmia or sleep apnea.
In this paper, we describe a new traitor tracing scheme which relies on Tardos’ collusion secure ... more In this paper, we describe a new traitor tracing scheme which relies on Tardos’ collusion secure codes to achieve constant size ciphertexts. Our scheme is also equipped with a black-box tracing procedure against pirates that are allowed to decrypt with some (possibly high) error rate while keeping the decoders of the lowest possible size when using collusion secure codes, namely of size proportional to the length of Tardos’ code.
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in t... more We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters’ identity-based encryption scheme.
In this paper the use of an accelerometer to measure cardio-respiratory activity is presented. Mo... more In this paper the use of an accelerometer to measure cardio-respiratory activity is presented. Movement of the chest was recorded by an accelerometer attached to a belt around the chest. The acquisition is realized in different status: normal, apnea, deep breathing or after exhaustion and also in different postures: vertical (sitting, standing) or horizontal (lying down). The resulting signal was compared with reference measurements. The results of experimental evaluation indicate that using a chest-accelerometer can correctly detect the respiratory waveform and heart rate (HR) signal. This method is therefore suitable for automatic identification some disease, for example arrhythmia or sleep apnea.
Uploads
Papers by Hieu Phan