Scalable public-key tracing and revoking
暂无分享,去创建一个
[1] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[2] Moni Naor,et al. Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.
[3] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[4] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[5] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[6] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[7] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[8] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[9] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[10] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[11] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[12] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[13] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[14] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[15] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[16] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[17] Wen-Guey Tzeng,et al. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares , 2001, Public Key Cryptography.
[18] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[19] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[20] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[21] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[22] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[23] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[24] V. Pan,et al. Polynomial and Matrix Computations , 1994, Progress in Theoretical Computer Science.
[25] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[26] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..