Robust fingerprinting codes: a near optimal construction
暂无分享,去创建一个
[1] Amos Fiat,et al. Dynamic Traitor Training , 1999, CRYPTO.
[2] Abhi Shelat,et al. Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.
[3] Serdar Pehlivanoglu,et al. Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.
[4] Brent Waters,et al. A fully collusion resistant broadcast, trace, and revoke system , 2006, CCS '06.
[5] Tamir Tassa,et al. Improved versions of Tardos’ fingerprinting scheme , 2008, Des. Codes Cryptogr..
[6] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[7] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[8] B. E. Eckbo,et al. Appendix , 1826, Epilepsy Research.
[9] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[10] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[11] Tamir Tassa,et al. Low Bandwidth Dynamic Traitor Tracing Schemes , 2005, Journal of Cryptology.
[12] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[13] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[15] Stefan Katzenbeisser,et al. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes , 2008, Des. Codes Cryptogr..
[16] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[17] Gábor Tardos,et al. High rate fingerprinting codes and the fingerprinting capacity , 2009, SODA.
[18] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[19] Tamir Tassa,et al. Improved efficiency for revocation schemes via Newton interpolation , 2006, TSEC.
[20] Koji Nuida,et al. A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure , 2009, ICITS.
[21] David Pointcheval,et al. Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.
[22] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[23] Duong Hieu Phan,et al. Traitor Tracing with Optimal Transmission Rate , 2007, ISC.
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[25] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[26] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[27] Reihaneh Safavi-Naini,et al. New traitor tracing schemes using bilinear map , 2003, DRM '03.
[28] Hideki Imai,et al. An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths , 2007, AAECC.
[29] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[30] Jirí Sgall,et al. Efficient dynamic traitor tracing , 2000, SODA '00.
[31] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[32] Olivier Billet,et al. Efficient Traitor Tracing from Collusion Secure Codes , 2008, ICITS.
[33] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[34] Moni Naor,et al. Efficient trace and revoke schemes , 2000, International Journal of Information Security.
[35] Jessica Staddon,et al. Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.
[36] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[37] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[38] Thomas Sirvent. Traitor tracing scheme with constant ciphertext rate against powerful pirates , 2006, IACR Cryptol. ePrint Arch..
[39] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.