메뉴 건너뛰기




Volumn 4450 LNCS, Issue , 2007, Pages 361-376

Identity-based traitor tracing

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKING; MATHEMATICAL MODELS; STANDARDIZATION;

EID: 38049020476     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71677-8_24     Document Type: Conference Paper
Times cited : (43)

References (17)
  • 1
    • 33746332056 scopus 로고    scopus 로고
    • Identity-based encryption gone wild
    • ICALP 2006, of, Springer-Verlag
    • M. Abdalla, D. Catalano, A. Dent, J. Malone-Lee, G. Neven, and N. Smart. Identity-based encryption gone wild. In ICALP 2006, Part II, volume 4052 of LNCS, pages 300-311. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4052 , Issue.PART II , pp. 300-311
    • Abdalla, M.1    Catalano, D.2    Dent, A.3    Malone-Lee, J.4    Neven, G.5    Smart, N.6
  • 2
    • 35248851617 scopus 로고    scopus 로고
    • Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive
    • Report 2005/417
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive, Report 2005/417, 2005. http://eprint.iacr.org/.
    • (2005)
    • Ballard, L.1    Green, M.2    de Medeiros, B.3    Monrose, F.4
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, pages 62-73. ACM Press, 1993.
    • (1993) ACM CCS 93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • CRYPTO 2004, of, Springer-Verlag
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In CRYPTO 2004, volume 3152 of LNCS, pages 41-55. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • CRYPTO'99, of, Springer-Verlag
    • D. Boneh and M. K. Franklin. An efficient public key traitor tracing scheme. In CRYPTO'99, volume 1666 of LNCS, pages 338-353. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.K.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • CRYPTO 2001, of, Springer-Verlag
    • D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 7
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • EUROCRYPT 2006, of, Springer-Verlag
    • D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 8
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data (extended abstract)
    • CRYPTO'95, of, Springer-Verlag
    • D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data (extended abstract). In CRYPTO'95, volume 963 of LNCS, pages 452-465. Springer-Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 9
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identitybased encryption
    • EUROCRYPT 2004, of, Springer-Verlag
    • R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identitybased encryption. In EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 10
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and Coding, 8th IMA International Conference, of, Springer-Verlag
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, 8th IMA International Conference, volume 2260 of LNCS, pages 360-363. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 11
    • 84959054452 scopus 로고    scopus 로고
    • On crafty pirates and foxy tracers
    • ACM CCS Digital Rights Management Workshop 2001, of, Springer-Verlag
    • A. Kiayias and M. Yung. On crafty pirates and foxy tracers. In ACM CCS Digital Rights Management Workshop 2001, volume 2320 of LNCS, pages 22-39. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2320 , pp. 22-39
    • Kiayias, A.1    Yung, M.2
  • 14
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated id-based key exchange and remote log-in with simple token and pin number. Cryptology ePrint Archive
    • Report 2002/164
    • M. Scott. Authenticated id-based key exchange and remote log-in with simple token and pin number. Cryptology ePrint Archive, Report 2002/164, 2002. http://eprint.iacr.org/.
    • (2002)
    • Scott, M.1
  • 15
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO'84, of, Springer-Verlag
    • A. Shamir, Identity-based cryptosystems and signature schemes. In CRYPTO'84, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 16
    • 0038447029 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • ACM Press
    • G. Tardos. Optimal probabilistic fingerprint codes. In 35th ACM STOC, pages 116-125. ACM Press, 2003.
    • (2003) 35th ACM STOC , pp. 116-125
    • Tardos, G.1
  • 17
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • EUROCRYPT 2005, of, Springer-Verlag
    • B. R. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.