-
1
-
-
38049142502
-
-
AACS Specifications (2006), http://www.aacsla.com/specifications/
-
AACS Specifications (2006), http://www.aacsla.com/specifications/
-
-
-
-
2
-
-
84957085257
-
An Efficient Public-Key Traitor Tracing Scheme
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
33746104815
-
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
4
-
-
0032162672
-
Collusion-Secure Fingerprinting for Digital Data
-
Boneh, D.. Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
24944511263
-
Public Traceability in Traitor Tracing Schemes
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Chabanne, H., Hieu Phan, D., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 542-558
-
-
Chabanne, H.1
Hieu Phan, D.2
Pointcheval, D.3
-
6
-
-
84985922619
-
Tracing Traitors
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
7
-
-
0034188648
-
Tracing Traitors
-
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory 46(3), 893-910 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
8
-
-
35248901924
-
-
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2003)
-
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
-
-
-
-
9
-
-
1142293090
-
Scalable public-key tracing and revoking
-
July 13-16, Boston, Massachusetts () 2003
-
Dodis, Y., Fazio, N., Kiayias, A., Yung, M.: Scalable public-key tracing and revoking. In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), July 13-16, 2003, Boston, Massachusetts (2003)
-
(2003)
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC
-
-
Dodis, Y.1
Fazio, N.2
Kiayias, A.3
Yung, M.4
-
10
-
-
84979291225
-
Broadcast Encryption
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
0013138808
-
Dynamic Traitor Tracing
-
Fiat, A., Tassa, T.: Dynamic Traitor Tracing. Journal of Cryptology 4(3), 211-223 (2001)
-
(2001)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
12
-
-
0022793132
-
How to Construct Random Functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. J. of the ACM 33(4), 792-807 (1986)
-
(1986)
J. of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
84957067564
-
Efficient Methods for Integrating Traceability and Broadcast Encryption
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Gafni, E., Staddon, J., Yin, Y.L.: Efficient Methods for Integrating Traceability and Broadcast Encryption. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 372-387. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
14
-
-
84974588069
-
Long-Lived Broadcast Encryption
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Garay, J.A., Staddon, J., Wool, A.: Long-Lived Broadcast Encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 333-352
-
-
Garay, J.A.1
Staddon, J.2
Wool, A.3
-
15
-
-
84937435227
-
The LSD Broadcast Encryption Scheme
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-30. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 47-30
-
-
Halevy, D.1
Shamir, A.2
-
16
-
-
24944542406
-
One-Way Chain Based Broadcast Encryption Schemes
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Jho, N., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-Way Chain Based Broadcast Encryption Schemes. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 559-574
-
-
Jho, N.1
Hwang, J.Y.2
Cheon, J.H.3
Kim, M.H.4
Lee, D.H.5
Yoo, E.S.6
-
17
-
-
84880901368
-
Self Protecting Pirates and Black-Box Traitor Tracing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 63-79. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
18
-
-
84959054452
-
-
Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 22-39. Springer, Heidelberg (2002)
-
Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
-
-
-
-
19
-
-
84947273176
-
Traitor Tracing with Constant Transmission Rate
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
20
-
-
35248866858
-
Optimum Traitor Tracing and Asymmetric Schemes
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145-157. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
21
-
-
33746382900
-
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Micciancio, D., Panjwani, S.: Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
-
-
Micciancio, D.1
Panjwani, S.2
-
22
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Naor, D., Naor, M., Lotspiech, J.B.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
23
-
-
84957617696
-
Threshold Traitor Tracing
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 502-517. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Frankel, Y, ed, FC, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
(2000)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
25
-
-
0031332843
-
Number-Theoretic Constructions of Efficient PseudoRandom Functions. In: FOCS '97
-
Los Alamitos
-
Naor, M., Reingold, O.: Number-Theoretic Constructions of Efficient PseudoRandom Functions. In: FOCS '97, pp. 458-467. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
IEEE Computer Society
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
26
-
-
84954420982
-
Trials of Traced Traitors
-
Anderson, R, ed, Information Hiding, Springer, Heidelberg
-
Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 49-63. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 49-63
-
-
Pfitzmann, B.1
-
27
-
-
33746370427
-
-
Phan, D.H., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full- Public-Traceability, pp. 264-275.
-
Generic Construction of Hybrid Public Key Traitor Tracing with Full- Public-Traceability
, pp. 264-275
-
-
Phan, D.H.1
Safavi-Naini, R.2
Tonien, D.3
-
28
-
-
84974601983
-
Sequential Traitor Tracing
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316-332. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
29
-
-
84959043688
-
-
Safavi-Naini, R., Wang, Y.: Collusion Secure q-ary Fingerprinting for Perceptual Content. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 57-75. Springer, Heidelberg (2002)
-
Safavi-Naini, R., Wang, Y.: Collusion Secure q-ary Fingerprinting for Perceptual Content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57-75. Springer, Heidelberg (2002)
-
-
-
-
30
-
-
0035504864
-
New Results on Frameproof Codes and Traceability Schemes
-
Safavi-Naini, R., Wang, Y.: New Results on Frameproof Codes and Traceability Schemes. IEEE Transactions on Information Theory 47(7), 3029-3033 (2001)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 3029-3033
-
-
Safavi-Naini, R.1
Wang, Y.2
-
31
-
-
35248837412
-
-
Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 81-100. Springer, Heidelberg (2003)
-
Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 81-100. Springer, Heidelberg (2003)
-
-
-
-
32
-
-
0035270516
-
Combinatorial Properties of Frameproof and Traceability Codes
-
Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial Properties of Frameproof and Traceability Codes. IEEE Transactions on Information Theory 47(3), 1042-1049 (2001)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
33
-
-
0002016098
-
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
-
Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Math. 11(1), 41-53 (1998)
-
(1998)
SIAM Journal on Discrete Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
|