메뉴 건너뛰기




Volumn , Issue , 2006, Pages 211-220

A fully collusion resistant broadcast, trace, and revoke system

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST ENCRYPTION; CIPHERTEXTS; PRIVATE KEY CRYPTOGRAPHY; TRACE-AND-REVOKE SYSTEMS; TRAITOR-TRACING;

EID: 34547269833     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180432     Document Type: Conference Paper
Times cited : (165)

References (38)
  • 1
    • 13944258256 scopus 로고    scopus 로고
    • A quick key distribution scheme with entity revocation
    • Springer-Verlag
    • J. Anzai, N. Matsuzaki, and T. Matsumoto. A quick key distribution scheme with entity revocation. In Proc. of Asiacrypt '99, pages 333-347. Springer-Verlag, 1999.
    • (1999) Proc. of Asiacrypt '99 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 4
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO '05, pages 258-275, 2005.
    • (2005) CRYPTO '05 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 5
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • Joe Kilián, editor, Proceedings of Theory of Cryptography Conference 2005, of, Springer
    • Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-dnf formulas on ciphertexts. In Joe Kilián, editor, Proceedings of Theory of Cryptography Conference 2005, volume 3378 of LNCS, pages 325-342. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 325-342
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 6
    • 33746096270 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • Dan Boneh, Amit Sahai, and Brent Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In Eurocrypt '06, 2006.
    • (2006) Eurocrypt '06
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 7
    • 5644266059 scopus 로고    scopus 로고
    • Applications of multilinear forms to cryptography
    • Dan Boneh and Alice Silverberg. Applications of multilinear forms to cryptography. Contemporary Mathematics, 324:71-90, 2003.
    • (2003) Contemporary Mathematics , vol.324 , pp. 71-90
    • Boneh, D.1    Silverberg, A.2
  • 8
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Proceedings of Eurocrypt 2004
    • Ran Canetti, Shai Halevi, and Jonathan Katz. Chosen-ciphertext security from identity-based encryption. In Proceedings of Eurocrypt 2004, LNCS, pages 207-222, 2004.
    • (2004) LNCS , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 9
    • 24944511263 scopus 로고    scopus 로고
    • Public traceability in traitor tracing schemes
    • Hervé Chabanne, Duong Hieu Phan, and David Pointcheval. Public traceability in traitor tracing schemes. In EUROCRYPT '05, pages 542-558, 2005.
    • (2005) EUROCRYPT '05 , pp. 542-558
    • Chabanne, H.1    Hieu Phan, D.2    Pointcheval, D.3
  • 10
    • 84985922619 scopus 로고
    • Tracing traitors
    • Proceedings of Crypto '94, of
    • B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Proceedings of Crypto '94, volume 839 of LNCS, pages 257-270, 1994.
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 12
    • 35248901924 scopus 로고    scopus 로고
    • Public key broadcast encryption for stateless receivers
    • Proceedings of the Digital Rights Management Workshop 2002, of, Springer
    • Yevgeniy Dodis and Nelly Fazio. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop 2002, volume 2696 of LNCS, pages 61-80. Springer, 2002.
    • (2002) LNCS , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 13
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Public Key Cryptography, PKC 2003, of
    • Yevgeniy Dodis and Nelly Fazio. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 100-115, 2003.
    • (2003) LNCS , vol.2567 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 14
    • 18744384346 scopus 로고    scopus 로고
    • Scalable public-key tracing and revoking
    • Extended abstract in PODC '03
    • Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, and Moti Yung. Scalable public-key tracing and revoking. Distributed Computing, 17(4):323-347, 2005. Extended abstract in PODC '03.
    • (2005) Distributed Computing , vol.17 , Issue.4 , pp. 323-347
    • Dodis, Y.1    Fazio, N.2    Kiayias, A.3    Yung, M.4
  • 15
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Proceedings of Crypto '93, of, Springer-Verlag
    • A. Fiat and M. Naor. Broadcast encryption. In Proceedings of Crypto '93, volume 773 of LNCS, pages 480-491. Springer-Verlag, 1993.
    • (1993) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 16
    • 84957076207 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • Proceedings of Crypto '99, of
    • Amos Fiat and T. Tassa. Dynamic traitor tracing. In Proceedings of Crypto '99, volume 1666 of LNCS, pages 354-371, 1999.
    • (1999) LNCS , vol.1666 , pp. 354-371
    • Fiat, A.1    Tassa, T.2
  • 19
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • Proceedings of Crypto '04, of
    • M. T. Goodrich, J. Z. Sun, and R. Tamassia. Efficient tree-based revocation in groups of low-state devices. In Proceedings of Crypto '04, volume 2204 of LNCS, 2004.
    • (2004) LNCS , vol.2204
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 20
    • 84937435227 scopus 로고    scopus 로고
    • The lsd broadcast encryption scheme
    • Proceedings of Crypto '02, of
    • D. Halevy and A. Shamir. The lsd broadcast encryption scheme. In Proceedings of Crypto '02, volume 2442 of LNCS, pages 47-60, 2002.
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 22
    • 35248831207 scopus 로고    scopus 로고
    • Aggelos Kiayias and Moti Yung. Breaking and repairing asymmetric public-key traitor tracing. In Joan Feigenbaum, editor, ACM Workshop in Digital Rights Management - DRM 2002, 2696 of Lecture Notes in Computer Science, pages pp. 32-50. Springer, 2002.
    • Aggelos Kiayias and Moti Yung. Breaking and repairing asymmetric public-key traitor tracing. In Joan Feigenbaum, editor, ACM Workshop in Digital Rights Management - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages pp. 32-50. Springer, 2002.
  • 23
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In Proceedings of Eurocrypt '98, pages 145-157, 1998.
    • (1998) Proceedings of Eurocrypt '98 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 24
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Proceedings of Crypto '01, of
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto '01, volume 2139 of LNCS, pages 41-62, 2001.
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 25
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Financial cryptography 2000, of, Springer
    • M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial cryptography 2000, volume 1962 of LNCS, pages 1-20. Springer, 2000.
    • (2000) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 29
    • 84974601983 scopus 로고    scopus 로고
    • Sequential traitor tracing
    • Proceedings of Crypto '00, of
    • Reihaneh Safavi-Naini and Yejing Wang. Sequential traitor tracing. In Proceedings of Crypto '00, volume 1880 of LNCS, pages 316-332, 2000.
    • (2000) LNCS , vol.1880 , pp. 316-332
    • Safavi-Naini, R.1    Wang, Y.2
  • 30
    • 77955708529 scopus 로고    scopus 로고
    • Efficient traitor tracing algorithms using list decoding
    • Proceedings of ASIACRYPT '01, of
    • Alice Silverberg, Jessica, Staddon, and Judy L. Walker. Efficient traitor tracing algorithms using list decoding. In Proceedings of ASIACRYPT '01, volume 2248 of LNCS, pages 175-192, 2001.
    • (2001) LNCS , vol.2248 , pp. 175-192
    • Silverberg, A.1    Jessica, S.2    Walker, J.L.3
  • 31
    • 34547375846 scopus 로고    scopus 로고
    • Jessica N. Staddon, Douglas R. Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.
    • Jessica N. Staddon, Douglas R. Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.
  • 32
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM Journal on Discrete Math, 11(1):41-53, 1998.
    • (1998) SIAM Journal on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.1    Wei, R.2
  • 33
    • 84890047469 scopus 로고    scopus 로고
    • Key preassigned traceability schemes for broadcast encryption
    • Proceedings of SAC '98, of
    • D. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. In Proceedings of SAC '98, volume 1556 of LNCS, 1998.
    • (1998) LNCS , vol.1556
    • Stinson, D.1    Wei, R.2
  • 34
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. R. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discret. Math., 11(1):41-53, 1998.
    • (1998) SIAM J. Discret. Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 35
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • Doug R. Stinson. On some methods for unconditionally secure key distribution and broadcast encryption. Des. Codes Cryptography, 12(3):215-243, 1997.
    • (1997) Des. Codes Cryptography , vol.12 , Issue.3 , pp. 215-243
    • Stinson, D.R.1
  • 36
    • 0005053804 scopus 로고    scopus 로고
    • Some new results on key distribution patterns and broadcast encryption
    • Doug R-. Stinson and Tran Van Trung. Some new results on key distribution patterns and broadcast encryption. Des. Codes Cryptography, 14(3):261-279, 1998.
    • (1998) Des. Codes Cryptography , vol.14 , Issue.3 , pp. 261-279
    • Stinson, D.R.1    Van Trung, T.2
  • 37
    • 84937411419 scopus 로고    scopus 로고
    • A public-key traitor tracing scheme with revocation using dynamic shares
    • Springer-Verlag
    • W. Tzeng and Z. Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares. In Proc. of PKC 2001, pages 207-224. Springer-Verlag, 2001.
    • (2001) Proc. of PKC 2001 , pp. 207-224
    • Tzeng, W.1    Tzeng, Z.2
  • 38
    • 84937577268 scopus 로고    scopus 로고
    • Efficient asymmetric public-key traitor tracing without trusted agents
    • Proceedings CT-R.SA '01, of
    • Yuji Watanabe, Goichiro Hanaoka, and Hideki Imai. Efficient asymmetric public-key traitor tracing without trusted agents. In Proceedings CT-R.SA '01, volume 2020 of LNCS, pages 392-407, 2001.
    • (2001) LNCS , vol.2020 , pp. 392-407
    • Watanabe, Y.1    Hanaoka, G.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.