A Fully Public-Key Traitor-Tracing Scheme
暂无分享,去创建一个
[1] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[2] Ernest F. Brickell,et al. A Fast Modular Multiplication Algorithm With Application To Two Key Cryptography , 1982, CRYPTO.
[3] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[4] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[5] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[6] Shimshon Berkovits,et al. How To Broadcast A Secret , 1991, EUROCRYPT.
[7] Evangelos Kranakis,et al. On key distribution via true broadcasting , 1994, CCS '94.
[8] Douglas R. Stinson,et al. Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution , 1996, CRYPTO.
[9] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[10] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[11] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[12] Jessica Staddon,et al. Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.
[13] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[14] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[15] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[16] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.