Breaking and Repairing Asymmetric Public-Key Traitor Tracing
暂无分享,去创建一个
[1] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[2] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.
[3] Hideki Imai,et al. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents , 2001, CT-RSA.
[4] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[5] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[6] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[7] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[8] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[9] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[10] Birgit Pfitzmann,et al. Asymmetric fingerprinting for larger collusions , 1997, CCS '97.
[11] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[12] Hideki Imai,et al. Efficient Asymmetric Self-Enforcement Scheme with Public Traceability , 2001, Public Key Cryptography.
[13] Moni Naor,et al. Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.
[14] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[15] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[16] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[17] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[18] Birgit Pfitzmann,et al. Asymmetric fingerprinting , 1996 .
[19] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[20] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[21] Chi-Jen Lu,et al. Oblivious polynomial evaluation and oblivious neural learning , 2001, Theor. Comput. Sci..
[22] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[23] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[24] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[25] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[26] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[27] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.