An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[2] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[3] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[4] Birgit Pfitzmann,et al. Asymmetric fingerprinting for larger collusions , 1997, CCS '97.
[5] Ran Canetti,et al. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.
[6] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[7] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[8] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[9] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[10] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[11] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[12] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[14] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[15] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[16] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[17] Wen-Guey Tzeng,et al. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares , 2001, Public Key Cryptography.
[18] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[19] Tomoyuki Asano. A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.
[20] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[21] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.