메뉴 건너뛰기




Volumn 2894, Issue , 2003, Pages 359-373

An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; HASH FUNCTIONS; SECURITY OF DATA;

EID: 0345058964     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40061-5_23     Document Type: Article
Times cited : (21)

References (22)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • EUROCRYPT'02
    • J.H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, EUROCRYPT'02, LNCS V.2332, pp.83-107, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84958760029 scopus 로고    scopus 로고
    • A revocation scheme with minimal storage at receivers
    • ASIACRYPT'02
    • T. Asano, A revocation scheme with minimal storage at receivers, ASIACRYPT'02, LNCS V.2501, pp.433-450, 2002.
    • (2002) LNCS , vol.2501 , pp. 433-450
    • Asano, T.1
  • 3
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • CRYTO'99
    • D. Boneh, M. Franklin, An efficient public key traitor tracing scheme, CRYTO'99, LNCS V.1666, pp.338-353, 1999.
    • (1999) LNCS , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 4
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh, J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transaction on Information Theory 44(5), pp.1897-1905, 1998.
    • (1998) IEEE Transaction on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 5
    • 84957712291 scopus 로고    scopus 로고
    • An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
    • EUROCRYPT'99
    • R. Canetti, S. Goldwasser, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack, EUROCRYPT'99, LNCS V.1592, pp.90-106, 1999.
    • (1999) LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 6
    • 84985922619 scopus 로고
    • Tracing traitor
    • CRYPTO'94
    • B. Chor, A. Fiat, M. Naor, Tracing traitor, CRYPTO'94, LNCS V.839, pp.257-270, 1994.
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • CRYPTO'98
    • R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO'98, LNCS V.1462, pp.13-25, 1998.
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Y. Dodis, N. Fazio, Public key trace and revoke scheme secure against adaptive chosen ciphertext attack, PKC'03, pp.100-115, 2003.
    • (2003) PKC'03 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 11
    • 84979291225 scopus 로고
    • Broadcast encryption
    • CRYPTO'93
    • A. Fiat, M. Naor, Broadcast encryption, CRYPTO'93, LNCS V.773 pp.480-491, 1993.
    • (1993) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 12
    • 84957067564 scopus 로고    scopus 로고
    • Efficient methods for integrating traceability and broadcast encryption
    • CRYPTO'99
    • E. Gafni, J. Staddon, Y.L. Yin, Efficient methods for integrating traceability and broadcast encryption, CRYPTO'99, LNCS V.1666, pp.372-287, 1999.
    • (1999) LNCS , vol.1666 , pp. 372-1287
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 13
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • CRYPTO'02
    • D. Halevy, A. Shamir, The LSD broadcast encryption scheme, CRYPTO'02, LNCS, V.2442, pp.47-60, 2002.
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 14
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • EUROCRYPT'98
    • K. Kurosawa, Y. Desmedt, Optimum traitor tracing and asymmetric schemes, EUROCRYPT'98, LNCS V.1403, pp.145-157, 1998.
    • (1998) LNCS , vol.1403 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 15
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • CRYPTO'01
    • D. Naor, M. Naor, J. Lostpiech, Revocation and tracing schemes for stateless receivers, CRYPTO'01, LNCS V.2139, pp.41-62, 2001.
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lostpiech, J.3
  • 16
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • CRYPTO'98
    • M. Naor, B. Pinkas, Threshold traitor tracing, CRYPTO'98, LNCS V. 1462, pp.502-517, 1998.
    • (1998) LNCS , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 17
    • 84954420982 scopus 로고    scopus 로고
    • Trials of traced traitors
    • Workshop on Information Hiding
    • B. Pfitzmann, Trials of traced traitors, Workshop on Information Hiding, LNCS V.1174, pp.49-64, 1996.
    • (1996) LNCS , vol.1174 , pp. 49-64
    • Pfitzmann, B.1
  • 19
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D.R. Stinson, R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Math 11(1), pp.41-53, 1998.
    • (1998) SIAM Journal on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 20
    • 84937411419 scopus 로고    scopus 로고
    • A public-key tracing scheme with revocation using dynamic shares
    • PKC'01
    • W.G. Tzeng, Z.J. Tzeng, A public-key tracing scheme with revocation using dynamic shares, PKC'01, LNCS 1992, pp.207-224, 2001.
    • (2001) LNCS , vol.1992 , pp. 207-224
    • Tzeng, W.G.1    Tzeng, Z.J.2
  • 22
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C.K. Wong, M. Gouda, S. Lam, Secure group communications using key graphs, ACM SIGCOMM'98, pp.68-79, 1998.
    • (1998) ACM SIGCOMM'98 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.