A representation of our traitor tracing algorithm built on top of threshold broadcast encryption. This tracing algorithm plays a crucial role in constructing the first traitor tracing scheme from pairings with O(N1/3) sized parameters, overcoming a quadratic barrier that had stood for almost 15 years. See .
Software watermarking protects against software piracy by embedding a "mark" into a program that cannot be removed without destroying the functionality of the program. A prominent example is traitor tracing, where the program being marked is a decryption functionality. There are a number of fundamental questions in watermarking/traitor tracing: achieving security against colluding users, attaining the shortest possible paramater sizes, embedding arbitrary information into the mark, ensuring honest users' embedded information remains private, and maintaining security in the presence of quantum adversaries, to name a few.

Composability in Watermarking Schemes
By Jiahui Liu and Mark Zhandry
In TCC 2024

Optimal Traitor Tracing from Pairings
By Mark Zhandry

Tracing Quantum State Distinguishers via Backtracking
By Mark Zhandry
In CRYPTO 2023

White Box Traitor Tracing
By Mark Zhandry
In CRYPTO 2021

Schrödinger's Pirate: How To Trace a Quantum Decoder
By Mark Zhandry
In TCC 2020

New Techniques for Traitor Tracing: Size N and More from Pairings
By Mark Zhandry
In CRYPTO 2020

Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman and Mark Zhandry
In TCC 2016-B

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs and Mark Zhandry
In EUROCRYPT 2016

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
In CRYPTO 2014, Algorithmica (Invited to Special Issue on Algorithmic Tools in Cryptography)