Content and Key Management to Trace Traitors in Broadcasting Services
暂无分享,去创建一个
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[3] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[4] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[5] Hideki Imai,et al. A Trade-off Traitor Tracing Scheme , 2009, IEICE Trans. Inf. Syst..
[6] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[7] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[8] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[9] David Pointcheval,et al. Message-Based Traitor Tracing with Optimal Ciphertext Rate , 2012, LATINCRYPT.
[10] Hideki Imai,et al. Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Serdar Pehlivanoglu,et al. Tracing and Revoking Pirate Rebroadcasts , 2009, ACNS.
[13] Hongxia Jin,et al. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack , 2007, ESORICS.
[14] Olivier Billet,et al. Traitors Collaborating in Public: Pirates 2.0 , 2009, EUROCRYPT.
[15] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[16] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[17] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[18] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[19] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[20] Reihaneh Safavi-Naini,et al. Sequential traitor tracing , 2003, IEEE Trans. Inf. Theory.
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[22] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[23] Tatsuaki Okamoto,et al. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.