Solutions to the anti-piracy problem in oblivious transfer
暂无分享,去创建一个
[1] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[2] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[3] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[4] Masakatu Morii,et al. Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Wen-Guey Tzeng,et al. Efficient k-out-of-n Oblivious Transfer Schemes , 2005, J. Univers. Comput. Sci..
[6] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[7] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[8] Ingemar J. Cox,et al. An Asymmetric Fingerprinting Scheme Based on Tardos Codes , 2011, Information Hiding.
[9] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[10] Josep Domingo-Ferrer,et al. Anonymous Fingerprinting Based on Committed Oblivious Transfer , 1999, Public Key Cryptography.
[11] Qiaoliang Li,et al. Asymmetric fingerprinting based on 1-out-of-n oblivious transfer , 2010, IEEE Communications Letters.
[12] Matthew Green,et al. Universally Composable Adaptive Oblivious Transfer , 2008, IACR Cryptol. ePrint Arch..
[13] Yehuda Lindell,et al. Efficient Fully-Simulatable Oblivious Transfer , 2008, Chic. J. Theor. Comput. Sci..
[14] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[15] Siu-Ming Yiu,et al. Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.
[16] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[17] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.
[18] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[19] Birgit Pfitzmann,et al. Anonymous Fingerprinting , 1997, EUROCRYPT.
[20] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[21] Fangguo Zhang,et al. Oblivious Transfer with Complex Attribute-Based Access Control , 2010, ICISC.
[22] Ki-Ryong Kwon,et al. Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme , 2004, Information Hiding.
[23] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[25] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[26] Lihua Liu,et al. Improvement of One Adaptive Oblivious Transfer Scheme , 2013, IACR Cryptol. ePrint Arch..
[27] Jan Camenisch. Efficient Anonymous Fingerprinting with Group Signatures , 2000, ASIACRYPT.
[28] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[29] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[30] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[31] Javier Herranz. Restricted adaptive oblivious transfer , 2011, Theor. Comput. Sci..
[32] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.