메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 264-275

Generic construction of hybrid public key traitor tracing with full-public-traceability

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; MULTI AGENT SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SEMANTICS;

EID: 33746370427     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_23     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new frame-work for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
    • [AGKS05], EUROCRYPT'05
    • [AGKS05] M. Abe, R. Gennaro, K. Kurosawa and V. Shoup, Tag-KEM/DEM: A New Frame-work for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM, EUROCRYPT'05, LNCS 3494, 128-146, 2005.
    • (2005) LNCS , vol.3494 , pp. 128-146
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion secure fingerprinting for digital data
    • [BS98]
    • [BS98] D. Boneh and J. Shaw, Collusion secure fingerprinting for digital data, IEEE Transactions on Information Theory 44 (1998), 1897-1905.
    • (1998) IEEE Transactions on Information Theory , vol.44 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 3
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • [CDHKS00], EUROCRYPT'00
    • [CDHKS00] R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz and A. Sahai, Exposure-resilient functions and all-or-nothing transforms, EUROCRYPT'00, LNCS 1807, 453-469, 2000.
    • (2000) LNCS , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 4
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen ciphertext security
    • [CKN03], CRYPTO'03
    • [CKN03] R. Canetti, H. Krawczyk and J.B. Nielsen, Relaxing chosen ciphertext security, CRYPTO'03, LNCS 2729, 565-582, 2003.
    • (2003) LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 5
    • 24944511263 scopus 로고    scopus 로고
    • Public traceability in traitor tracing schemes
    • [CPP05], EUROCRYPT'05
    • [CPP05] H. Chabanne, D.H. Phan and D. Pointcheval, Public traceability in traitor tracing schemes, EUROCRYPT'05, LNCS 3494, 542-558, 2005.
    • (2005) LNCS , vol.3494 , pp. 542-558
    • Chabanne, H.1    Phan, D.H.2    Pointcheval, D.3
  • 6
    • 84985922619 scopus 로고
    • Tracing traitor
    • [CFN94], CRYPTO'94
    • [CFN94] B. Chor, A. Fiat and M. Naor, Tracing traitor, CRYPTO'94, LNCS 839, 257-270, 1994.
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 7
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • [CS03]
    • [CS03] R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM J. of Computing 33 (2003), 167-226.
    • (2003) SIAM J. of Computing , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 8
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • [KY02], EURO-CRYPT'02
    • [KY02] A. Kiayias and M. Yung, Traitor tracing with constant transmission rate, EURO-CRYPT'02, LNCS 2332, 450-465, 2002.
    • (2002) LNCS , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 10
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • [Riv97], FSE'97
    • [Riv97] R. Rivest, All-or-nothing encryption and the package transform, FSE'97, LNCS 1267, 210-218, 1997.
    • (1997) LNCS , vol.1267 , pp. 210-218
    • Rivest, R.1
  • 12
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • [SW98]
    • [SW98] D.R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics 11 (1998), 41-53.
    • (1998) SIAM Journal on Discrete Mathematics , vol.11 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 14
    • 33645541516 scopus 로고    scopus 로고
    • Recursive constructions of secure codes and hash families using difference function families
    • [TS06]
    • [TS06] D. Tonien and R. Safavi-Naini, Recursive constructions of secure codes and hash families using difference function families, J. of Combinatorial Theory A 113 (4)(2006), 664-674.
    • (2006) J. of Combinatorial Theory A , vol.113 , Issue.4 , pp. 664-674
    • Tonien, D.1    Safavi-Naini, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.