How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
暂无分享,去创建一个
[1] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[2] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[3] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[4] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[5] Tatsuaki Okamoto,et al. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.
[6] Hideki Imai,et al. Content and Key Management to Trace Traitors in Broadcasting Services , 2015, STM.
[7] Hideki Imai,et al. Trade-Off Traitor Tracing , 2007, INDOCRYPT.
[8] Kaoru Kurosawa,et al. Linear Code Implies Public-Key Traitor Tracing , 2002, Public Key Cryptography.
[9] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[10] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[11] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[12] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[13] Reihaneh Safavi-Naini,et al. Sequential traitor tracing , 2003, IEEE Trans. Inf. Theory.
[14] Hideki Imai,et al. A secure traitor tracing scheme against key exposure , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[15] Serdar Pehlivanoglu,et al. Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.
[16] Mark Zhandry,et al. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key , 2016, EUROCRYPT.
[17] Reihaneh Safavi-Naini,et al. New traitor tracing schemes using bilinear map , 2003, DRM '03.
[18] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[19] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[20] Hideki Imai,et al. A Trade-off Traitor Tracing Scheme , 2009, IEICE Trans. Inf. Syst..
[21] David Pointcheval,et al. Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.
[22] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[23] Hideki Imai,et al. A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates , 2004, ASIACRYPT.
[24] Hongxia Jin,et al. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack , 2007, ESORICS.
[25] Hideki Imai,et al. Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service , 2006, ACISP.
[26] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[27] Aggelos Kiayias,et al. Scalable public-key tracing and revoking , 2003, PODC.
[28] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[29] David Pointcheval,et al. Message-Based Traitor Tracing with Optimal Ciphertext Rate , 2012, LATINCRYPT.
[30] Hideki Imai,et al. Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[31] Olivier Billet,et al. A Traceable Block Cipher , 2003, ASIACRYPT.
[32] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[33] Amos Fiat,et al. Dynamic Traitor Training , 1999, CRYPTO.
[34] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[35] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[36] Moni Naor,et al. Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.
[37] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[38] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.