Scalable public-key tracing and revoking
暂无分享,去创建一个
Aggelos Kiayias | Moti Yung | Yevgeniy Dodis | Nelly Fazio | A. Kiayias | M. Yung | Nelly Fazio | Y. Dodis
[1] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[2] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[3] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[4] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[5] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[6] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[7] Donald E. Knuth,et al. fundamental algorithms , 1969 .
[8] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[9] Wen-Guey Tzeng,et al. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares , 2001, Public Key Cryptography.
[10] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[11] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[12] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[13] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[14] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[15] Aggelos Kiayias,et al. Scalable public-key tracing and revoking , 2003, PODC.
[16] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[17] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[18] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[19] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[20] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[21] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[22] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[23] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[25] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[26] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[27] V. Pan,et al. Polynomial and Matrix Computations , 1994, Progress in Theoretical Computer Science.
[28] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[29] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.