Information hiding for EC: public key traitor tracing for digital copyright protection
暂无分享,去创建一个
[1] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[2] Birgit Pfitzmann,et al. Asymmetric fingerprinting for larger collusions , 1997, CCS '97.
[3] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[4] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[7] Michael Goldsmith. The perfect spy for model−checking crypto−protocols , 1997 .
[8] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[9] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.