Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
暂无分享,去创建一个
[1] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[2] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[3] Serdar Pehlivanoglu,et al. On the security of a public-key traitor tracing scheme with sublinear ciphertext size , 2009, DRM '09.
[4] Pil Joong Lee,et al. Advances in Cryptology — ASIACRYPT 2001 , 2001, Lecture Notes in Computer Science.
[5] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[6] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[7] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[8] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[9] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[10] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[11] Hideki Imai,et al. A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates , 2004, ASIACRYPT.
[12] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[13] Reihaneh Safavi-Naini,et al. Sequential Traitor Tracing , 2000, CRYPTO.
[14] Aggelos Kiayias,et al. Scalable public-key tracing and revoking , 2003, PODC.
[15] Jessica Staddon,et al. Efficient Methods for Integrating Traceability and Broadcast Encryption , 1999, CRYPTO.
[16] David Pointcheval,et al. Public Traceability in Traitor Tracing Schemes , 2005, EUROCRYPT.
[17] Brent Waters,et al. A fully collusion resistant broadcast, trace, and revoke system , 2006, CCS '06.
[18] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[19] Moni Naor,et al. Traitor tracing with constant size ciphertext , 2008, CCS.
[20] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[21] Nuttapong Attrapadung,et al. Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys , 2007, ICALP.
[22] Serdar Pehlivanoglu,et al. Improving the Round Complexity of Traitor Tracing Schemes , 2010, ACNS.
[23] Reihaneh Safavi-Naini,et al. Traitor Tracing for Shortened and Corrupted Fingerprints , 2002, Digital Rights Management Workshop.
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[25] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[26] Yvo Desmedt,et al. Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.
[27] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[28] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[29] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[30] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[31] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[32] Dongvu Tonien,et al. Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability , 2006, ICALP.
[33] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[34] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[35] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[36] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[37] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[38] MoonShik Lee,et al. Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size , 2009, ACNS.