-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
EUROCRYPT'02
-
J.H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, EUROCRYPT'02, LNCS V.2332, pp.83-107, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84958760029
-
A revocation scheme with minimal storage at receivers
-
ASIACRYPT'02
-
T. Asano, A revocation scheme with minimal storage at receivers, ASIACRYPT'02, LNCS V.2501, pp.433-450, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 433-450
-
-
Asano, T.1
-
3
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
CRYTO'99
-
D. Boneh, M. Franklin, An efficient public key traitor tracing scheme, CRYTO'99, LNCS V.1666, pp.338-353, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh, J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transaction on Information Theory 44(5), pp.1897-1905, 1998.
-
(1998)
IEEE Transaction on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
EUROCRYPT'99
-
R. Canetti, S. Goldwasser, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack, EUROCRYPT'99, LNCS V.1592, pp.90-106, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
6
-
-
84985922619
-
Tracing traitor
-
CRYPTO'94
-
B. Chor, A. Fiat, M. Naor, Tracing traitor, CRYPTO'94, LNCS V.839, pp.257-270, 1994.
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
CRYPTO'98
-
R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO'98, LNCS V.1462, pp.13-25, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
35248899841
-
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
-
Y. Dodis, N. Fazio, Public key trace and revoke scheme secure against adaptive chosen ciphertext attack, PKC'03, pp.100-115, 2003.
-
(2003)
PKC'03
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
11
-
-
84979291225
-
Broadcast encryption
-
CRYPTO'93
-
A. Fiat, M. Naor, Broadcast encryption, CRYPTO'93, LNCS V.773 pp.480-491, 1993.
-
(1993)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
84957067564
-
Efficient methods for integrating traceability and broadcast encryption
-
CRYPTO'99
-
E. Gafni, J. Staddon, Y.L. Yin, Efficient methods for integrating traceability and broadcast encryption, CRYPTO'99, LNCS V.1666, pp.372-287, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 372-1287
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
13
-
-
84937435227
-
The LSD broadcast encryption scheme
-
CRYPTO'02
-
D. Halevy, A. Shamir, The LSD broadcast encryption scheme, CRYPTO'02, LNCS, V.2442, pp.47-60, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
14
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
EUROCRYPT'98
-
K. Kurosawa, Y. Desmedt, Optimum traitor tracing and asymmetric schemes, EUROCRYPT'98, LNCS V.1403, pp.145-157, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
15
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
CRYPTO'01
-
D. Naor, M. Naor, J. Lostpiech, Revocation and tracing schemes for stateless receivers, CRYPTO'01, LNCS V.2139, pp.41-62, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lostpiech, J.3
-
16
-
-
84957617696
-
Threshold traitor tracing
-
CRYPTO'98
-
M. Naor, B. Pinkas, Threshold traitor tracing, CRYPTO'98, LNCS V. 1462, pp.502-517, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
17
-
-
84954420982
-
Trials of traced traitors
-
Workshop on Information Hiding
-
B. Pfitzmann, Trials of traced traitors, Workshop on Information Hiding, LNCS V.1174, pp.49-64, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
19
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D.R. Stinson, R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Math 11(1), pp.41-53, 1998.
-
(1998)
SIAM Journal on Discrete Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
20
-
-
84937411419
-
A public-key tracing scheme with revocation using dynamic shares
-
PKC'01
-
W.G. Tzeng, Z.J. Tzeng, A public-key tracing scheme with revocation using dynamic shares, PKC'01, LNCS 1992, pp.207-224, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 207-224
-
-
Tzeng, W.G.1
Tzeng, Z.J.2
-
21
-
-
0003259063
-
Key management for multicast: Issues and Architectures
-
D.M. Wallner, E.J. Harder, R.C. Agee, Key management for multicast: Issues and Architectures, IETF Network Working Group, RFC 2627, 1999.
-
(1999)
IETF Network Working Group, RFC 2627
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
22
-
-
0032178082
-
Secure group communications using key graphs
-
C.K. Wong, M. Gouda, S. Lam, Secure group communications using key graphs, ACM SIGCOMM'98, pp.68-79, 1998.
-
(1998)
ACM SIGCOMM'98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
|