메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 448-465

Pirate evolution: How to make the most of your traitor keys

Author keywords

[No Author keywords available]

Indexed keywords

DECODING; NUMERICAL METHODS; SECURITY OF DATA;

EID: 38049163807     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_25     Document Type: Conference Paper
Times cited : (19)

References (34)
  • 1
    • 38049142502 scopus 로고    scopus 로고
    • AACS Specifications (2006), http://www.aacsla.com/specifications/
    • AACS Specifications (2006), http://www.aacsla.com/specifications/
  • 2
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public-Key Traitor Tracing Scheme
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 3
    • 33746104815 scopus 로고    scopus 로고
    • Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 4
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-Secure Fingerprinting for Digital Data
    • Boneh, D.. Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 5
    • 24944511263 scopus 로고    scopus 로고
    • Public Traceability in Traitor Tracing Schemes
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Chabanne, H., Hieu Phan, D., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 542-558
    • Chabanne, H.1    Hieu Phan, D.2    Pointcheval, D.3
  • 6
    • 84985922619 scopus 로고
    • Tracing Traitors
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 8
    • 35248901924 scopus 로고    scopus 로고
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2003)
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
  • 10
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773
    • Fiat, A.1    Naor, M.2
  • 11
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic Traitor Tracing
    • Fiat, A., Tassa, T.: Dynamic Traitor Tracing. Journal of Cryptology 4(3), 211-223 (2001)
    • (2001) Journal of Cryptology , vol.4 , Issue.3 , pp. 211-223
    • Fiat, A.1    Tassa, T.2
  • 12
  • 13
    • 84957067564 scopus 로고    scopus 로고
    • Efficient Methods for Integrating Traceability and Broadcast Encryption
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Gafni, E., Staddon, J., Yin, Y.L.: Efficient Methods for Integrating Traceability and Broadcast Encryption. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 372-387. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 14
    • 84974588069 scopus 로고    scopus 로고
    • Long-Lived Broadcast Encryption
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Garay, J.A., Staddon, J., Wool, A.: Long-Lived Broadcast Encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 333-352
    • Garay, J.A.1    Staddon, J.2    Wool, A.3
  • 15
    • 84937435227 scopus 로고    scopus 로고
    • The LSD Broadcast Encryption Scheme
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-30. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 47-30
    • Halevy, D.1    Shamir, A.2
  • 16
    • 24944542406 scopus 로고    scopus 로고
    • One-Way Chain Based Broadcast Encryption Schemes
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Jho, N., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-Way Chain Based Broadcast Encryption Schemes. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 559-574
    • Jho, N.1    Hwang, J.Y.2    Cheon, J.H.3    Kim, M.H.4    Lee, D.H.5    Yoo, E.S.6
  • 17
    • 84880901368 scopus 로고    scopus 로고
    • Self Protecting Pirates and Black-Box Traitor Tracing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 63-79. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 63-79
    • Kiayias, A.1    Yung, M.2
  • 18
    • 84959054452 scopus 로고    scopus 로고
    • Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 22-39. Springer, Heidelberg (2002)
    • Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
  • 19
    • 84947273176 scopus 로고    scopus 로고
    • Traitor Tracing with Constant Transmission Rate
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 20
    • 35248866858 scopus 로고    scopus 로고
    • Optimum Traitor Tracing and Asymmetric Schemes
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145-157. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 21
    • 33746382900 scopus 로고    scopus 로고
    • Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Micciancio, D., Panjwani, S.: Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052
    • Micciancio, D.1    Panjwani, S.2
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Naor, D., Naor, M., Lotspiech, J.B.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.B.3
  • 23
    • 84957617696 scopus 로고    scopus 로고
    • Threshold Traitor Tracing
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 502-517. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 24
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Frankel, Y, ed, FC, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2000) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 25
    • 0031332843 scopus 로고    scopus 로고
    • Number-Theoretic Constructions of Efficient PseudoRandom Functions. In: FOCS '97
    • Los Alamitos
    • Naor, M., Reingold, O.: Number-Theoretic Constructions of Efficient PseudoRandom Functions. In: FOCS '97, pp. 458-467. IEEE Computer Society, Los Alamitos (1997)
    • (1997) IEEE Computer Society , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 26
    • 84954420982 scopus 로고    scopus 로고
    • Trials of Traced Traitors
    • Anderson, R, ed, Information Hiding, Springer, Heidelberg
    • Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 49-63. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 49-63
    • Pfitzmann, B.1
  • 28
    • 84974601983 scopus 로고    scopus 로고
    • Sequential Traitor Tracing
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316-332. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 316-332
    • Safavi-Naini, R.1    Wang, Y.2
  • 29
    • 84959043688 scopus 로고    scopus 로고
    • Safavi-Naini, R., Wang, Y.: Collusion Secure q-ary Fingerprinting for Perceptual Content. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 57-75. Springer, Heidelberg (2002)
    • Safavi-Naini, R., Wang, Y.: Collusion Secure q-ary Fingerprinting for Perceptual Content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57-75. Springer, Heidelberg (2002)
  • 30
    • 0035504864 scopus 로고    scopus 로고
    • New Results on Frameproof Codes and Traceability Schemes
    • Safavi-Naini, R., Wang, Y.: New Results on Frameproof Codes and Traceability Schemes. IEEE Transactions on Information Theory 47(7), 3029-3033 (2001)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 3029-3033
    • Safavi-Naini, R.1    Wang, Y.2
  • 31
    • 35248837412 scopus 로고    scopus 로고
    • Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 81-100. Springer, Heidelberg (2003)
    • Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 81-100. Springer, Heidelberg (2003)
  • 33
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
    • Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Math. 11(1), 41-53 (1998)
    • (1998) SIAM Journal on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.