-
1
-
-
13944258256
-
A quick key distribution scheme with entity revocation
-
Springer-Verlag
-
J. Anzai, N. Matsuzaki, and T. Matsumoto. A quick key distribution scheme with entity revocation. In Proc. of Asiacrypt '99, pages 333-347. Springer-Verlag, 1999.
-
(1999)
Proc. of Asiacrypt '99
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
4
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO '05, pages 258-275, 2005.
-
(2005)
CRYPTO '05
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
5
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
Joe Kilián, editor, Proceedings of Theory of Cryptography Conference 2005, of, Springer
-
Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-dnf formulas on ciphertexts. In Joe Kilián, editor, Proceedings of Theory of Cryptography Conference 2005, volume 3378 of LNCS, pages 325-342. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 325-342
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
6
-
-
33746096270
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
Dan Boneh, Amit Sahai, and Brent Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In Eurocrypt '06, 2006.
-
(2006)
Eurocrypt '06
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
7
-
-
5644266059
-
Applications of multilinear forms to cryptography
-
Dan Boneh and Alice Silverberg. Applications of multilinear forms to cryptography. Contemporary Mathematics, 324:71-90, 2003.
-
(2003)
Contemporary Mathematics
, vol.324
, pp. 71-90
-
-
Boneh, D.1
Silverberg, A.2
-
8
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Proceedings of Eurocrypt 2004
-
Ran Canetti, Shai Halevi, and Jonathan Katz. Chosen-ciphertext security from identity-based encryption. In Proceedings of Eurocrypt 2004, LNCS, pages 207-222, 2004.
-
(2004)
LNCS
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
9
-
-
24944511263
-
Public traceability in traitor tracing schemes
-
Hervé Chabanne, Duong Hieu Phan, and David Pointcheval. Public traceability in traitor tracing schemes. In EUROCRYPT '05, pages 542-558, 2005.
-
(2005)
EUROCRYPT '05
, pp. 542-558
-
-
Chabanne, H.1
Hieu Phan, D.2
Pointcheval, D.3
-
10
-
-
84985922619
-
Tracing traitors
-
Proceedings of Crypto '94, of
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Proceedings of Crypto '94, volume 839 of LNCS, pages 257-270, 1994.
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
11
-
-
0034188648
-
Tracing traitors
-
Benny Chor, Amos Fiat, Moni Naor, and Benny Pinkas. Tracing traitors. IEEE Transactions on Information Theory, 46(3):893-910, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
12
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
Proceedings of the Digital Rights Management Workshop 2002, of, Springer
-
Yevgeniy Dodis and Nelly Fazio. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop 2002, volume 2696 of LNCS, pages 61-80. Springer, 2002.
-
(2002)
LNCS
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
13
-
-
35248899841
-
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
-
Public Key Cryptography, PKC 2003, of
-
Yevgeniy Dodis and Nelly Fazio. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 100-115, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
14
-
-
18744384346
-
Scalable public-key tracing and revoking
-
Extended abstract in PODC '03
-
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, and Moti Yung. Scalable public-key tracing and revoking. Distributed Computing, 17(4):323-347, 2005. Extended abstract in PODC '03.
-
(2005)
Distributed Computing
, vol.17
, Issue.4
, pp. 323-347
-
-
Dodis, Y.1
Fazio, N.2
Kiayias, A.3
Yung, M.4
-
15
-
-
84979291225
-
Broadcast encryption
-
Proceedings of Crypto '93, of, Springer-Verlag
-
A. Fiat and M. Naor. Broadcast encryption. In Proceedings of Crypto '93, volume 773 of LNCS, pages 480-491. Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
16
-
-
84957076207
-
Dynamic traitor tracing
-
Proceedings of Crypto '99, of
-
Amos Fiat and T. Tassa. Dynamic traitor tracing. In Proceedings of Crypto '99, volume 1666 of LNCS, pages 354-371, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 354-371
-
-
Fiat, A.1
Tassa, T.2
-
17
-
-
84957067564
-
Efficient methods for integrating traceability and broadcast encryption
-
London, UK, Springer-Verlag
-
Eli Gafni, Jessica Staddon, and Yiqun Lisa Yin. Efficient methods for integrating traceability and broadcast encryption. In CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pages 372-387, London, UK, 1999. Springer-Verlag.
-
(1999)
CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Lisa Yin, Y.3
-
19
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
Proceedings of Crypto '04, of
-
M. T. Goodrich, J. Z. Sun, and R. Tamassia. Efficient tree-based revocation in groups of low-state devices. In Proceedings of Crypto '04, volume 2204 of LNCS, 2004.
-
(2004)
LNCS
, vol.2204
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
20
-
-
84937435227
-
The lsd broadcast encryption scheme
-
Proceedings of Crypto '02, of
-
D. Halevy and A. Shamir. The lsd broadcast encryption scheme. In Proceedings of Crypto '02, volume 2442 of LNCS, pages 47-60, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
22
-
-
35248831207
-
-
Aggelos Kiayias and Moti Yung. Breaking and repairing asymmetric public-key traitor tracing. In Joan Feigenbaum, editor, ACM Workshop in Digital Rights Management - DRM 2002, 2696 of Lecture Notes in Computer Science, pages pp. 32-50. Springer, 2002.
-
Aggelos Kiayias and Moti Yung. Breaking and repairing asymmetric public-key traitor tracing. In Joan Feigenbaum, editor, ACM Workshop in Digital Rights Management - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages pp. 32-50. Springer, 2002.
-
-
-
-
23
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In Proceedings of Eurocrypt '98, pages 145-157, 1998.
-
(1998)
Proceedings of Eurocrypt '98
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
24
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Proceedings of Crypto '01, of
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto '01, volume 2139 of LNCS, pages 41-62, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
25
-
-
84944319284
-
Efficient trace and revoke schemes
-
Financial cryptography 2000, of, Springer
-
M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial cryptography 2000, volume 1962 of LNCS, pages 1-20. Springer, 2000.
-
(2000)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
84974601983
-
Sequential traitor tracing
-
Proceedings of Crypto '00, of
-
Reihaneh Safavi-Naini and Yejing Wang. Sequential traitor tracing. In Proceedings of Crypto '00, volume 1880 of LNCS, pages 316-332, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
30
-
-
77955708529
-
Efficient traitor tracing algorithms using list decoding
-
Proceedings of ASIACRYPT '01, of
-
Alice Silverberg, Jessica, Staddon, and Judy L. Walker. Efficient traitor tracing algorithms using list decoding. In Proceedings of ASIACRYPT '01, volume 2248 of LNCS, pages 175-192, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 175-192
-
-
Silverberg, A.1
Jessica, S.2
Walker, J.L.3
-
31
-
-
34547375846
-
-
Jessica N. Staddon, Douglas R. Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.
-
Jessica N. Staddon, Douglas R. Stinson, and Ruizhong Wei. Combinatorial properties of frameproof and traceability codes. Cryptology ePrint 2000/004, 2000.
-
-
-
-
32
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM Journal on Discrete Math, 11(1):41-53, 1998.
-
(1998)
SIAM Journal on Discrete Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.1
Wei, R.2
-
33
-
-
84890047469
-
Key preassigned traceability schemes for broadcast encryption
-
Proceedings of SAC '98, of
-
D. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. In Proceedings of SAC '98, volume 1556 of LNCS, 1998.
-
(1998)
LNCS
, vol.1556
-
-
Stinson, D.1
Wei, R.2
-
34
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. R. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discret. Math., 11(1):41-53, 1998.
-
(1998)
SIAM J. Discret. Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
35
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
Doug R. Stinson. On some methods for unconditionally secure key distribution and broadcast encryption. Des. Codes Cryptography, 12(3):215-243, 1997.
-
(1997)
Des. Codes Cryptography
, vol.12
, Issue.3
, pp. 215-243
-
-
Stinson, D.R.1
-
36
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
Doug R-. Stinson and Tran Van Trung. Some new results on key distribution patterns and broadcast encryption. Des. Codes Cryptography, 14(3):261-279, 1998.
-
(1998)
Des. Codes Cryptography
, vol.14
, Issue.3
, pp. 261-279
-
-
Stinson, D.R.1
Van Trung, T.2
-
37
-
-
84937411419
-
A public-key traitor tracing scheme with revocation using dynamic shares
-
Springer-Verlag
-
W. Tzeng and Z. Tzeng. A public-key traitor tracing scheme with revocation using dynamic shares. In Proc. of PKC 2001, pages 207-224. Springer-Verlag, 2001.
-
(2001)
Proc. of PKC 2001
, pp. 207-224
-
-
Tzeng, W.1
Tzeng, Z.2
-
38
-
-
84937577268
-
Efficient asymmetric public-key traitor tracing without trusted agents
-
Proceedings CT-R.SA '01, of
-
Yuji Watanabe, Goichiro Hanaoka, and Hideki Imai. Efficient asymmetric public-key traitor tracing without trusted agents. In Proceedings CT-R.SA '01, volume 2020 of LNCS, pages 392-407, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 392-407
-
-
Watanabe, Y.1
Hanaoka, G.2
Imai, H.3
|