-
2
-
-
33646817761
-
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Attrapadung, N., Imai, H.: Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 100-120. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 100-120
-
-
Attrapadung, N.1
Imai, H.2
-
3
-
-
68849104275
-
-
SODA
-
Berkman, O., Parnas, M., Sgall, J.: Efficient dynamic traitor tracing. In: SODA 2000, pp. 586-595 (2000)
-
(2000)
Efficient dynamic traitor tracing
, pp. 586-595
-
-
Berkman, O.1
Parnas, M.2
Sgall, J.3
-
4
-
-
84957085257
-
An Efficient Public-Key Traitor Tracing Scheme
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
33746104815
-
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
6
-
-
0032162672
-
Collusion-Secure Fingerprinting for Digital Data
-
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
7
-
-
84985922619
-
Tracing Traitors
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
8
-
-
0034188648
-
Tracing Traitors
-
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory 46(3), 893-910 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
9
-
-
24944511263
-
Public Traceability in Traitor Tracing Schemes
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Chabanne, H., Hieu Phan, D., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 542-558
-
-
Chabanne, H.1
Hieu Phan, D.2
Pointcheval, D.3
-
10
-
-
0031362116
-
Secure spread spectrum water-marking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum water-marking for multimedia. IEEE Transactions on Image Processing 6(12), 1673-1687 (1997)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
11
-
-
35248901924
-
-
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2003)
-
Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
-
-
-
-
12
-
-
1142293090
-
Scalable public-key tracing and revoking
-
Boston, Massachusetts, July 13-16
-
Dodis, Y., Fazio, N., Kiayias, A., Yung, M.: Scalable public-key tracing and revoking. In: PODC 2003, Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), Boston, Massachusetts, July 13-16 (2003)
-
(2003)
PODC 2003, Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC
-
-
Dodis, Y.1
Fazio, N.2
Kiayias, A.3
Yung, M.4
-
13
-
-
84979291225
-
Broadcast Encryption
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
0013138808
-
Dynamic Traitor Tracing
-
Fiat, A., Tassa, T.: Dynamic Traitor Tracing. Journal of Cryptology 4(3), 211-223 (2001)
-
(2001)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
15
-
-
38749132987
-
Explicit Exclusive Set Systems with Applications to Broadcast Encryption
-
Gentry, C., Ramzan, Z., Woodruff, D.P.: Explicit Exclusive Set Systems with Applications to Broadcast Encryption. In: FOCS 2006, pp. 27-38 (2006)
-
(2006)
FOCS 2006
, pp. 27-38
-
-
Gentry, C.1
Ramzan, Z.2
Woodruff, D.P.3
-
16
-
-
84957067564
-
Efficient Methods for Integrating Traceability and Broadcast Encryption
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Gafni, E., Staddon, J., Lisa Yin, Y.: Efficient Methods for Integrating Traceability and Broadcast Encryption. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 372-387. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Lisa Yin, Y.3
-
17
-
-
84974588069
-
Long-Lived Broadcast Encryption
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Garay, J.A., Staddon, J., Wool, A.: Long-Lived Broadcast Encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 333-352
-
-
Garay, J.A.1
Staddon, J.2
Wool, A.3
-
18
-
-
24944584332
-
Efficient Tree-Based Revocation in Groups of Low-State Devices
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient Tree-Based Revocation in Groups of Low-State Devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511-527. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
19
-
-
84937435227
-
The LSD Broadcast Encryption Scheme
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
20
-
-
38049019851
-
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Jin, H., Lotspiech, J.: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 563-577. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 563-577
-
-
Jin, H.1
Lotspiech, J.2
-
21
-
-
18844419457
-
Traitor tracing for prerecorded and recordable media
-
Jin, H., Lotspiech, J., Nusser, S.: Traitor tracing for prerecorded and recordable media. In: Digital Rights Management Workshop, pp. 83-90 (2004)
-
(2004)
Digital Rights Management Workshop
, pp. 83-90
-
-
Jin, H.1
Lotspiech, J.2
Nusser, S.3
-
22
-
-
84880901368
-
Self Protecting Pirates and Black-Box Traitor Tracing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 63-79. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
23
-
-
84959054452
-
-
Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 22-39. Springer, Heidelberg (2002)
-
Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
-
-
-
-
24
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Kiayias, A., Yung, M.: Traitor tracing with constant transmission rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
25
-
-
38049163807
-
Pirate Evolution: How to Make the Most of Your Traitor Keys
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Kiayias, A., Pehlivanoglu, S.: Pirate Evolution: How to Make the Most of Your Traitor Keys. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 448-465. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 448-465
-
-
Kiayias, A.1
Pehlivanoglu, S.2
-
26
-
-
35248866858
-
Optimum Traitor Tracing and Asymmetric Schemes
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145-157. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
27
-
-
33746085504
-
-
Le, T.V., Burmester, M., Hu, J.: Short c-Secure Fingerprinting Codes. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 422-427. Springer, Heidelberg (2003)
-
Le, T.V., Burmester, M., Hu, J.: Short c-Secure Fingerprinting Codes. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 422-427. Springer, Heidelberg (2003)
-
-
-
-
28
-
-
33746382900
-
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Micciancio, D., Panjwani, S.: Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 70-82. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 70-82
-
-
Micciancio, D.1
Panjwani, S.2
-
29
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Naor, D., Naor, M., Lotspiech, J.B.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
30
-
-
84957617696
-
Threshold Traitor Tracing
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 502-517. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
31
-
-
84944319284
-
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, 1962, pp. 1-20. Springer, Heidelberg (2001)
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
-
-
-
32
-
-
68849107877
-
-
Hieu Phan, D., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 49-63. Springer, Heidelberg (1996)
-
Hieu Phan, D., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 49-63. Springer, Heidelberg (1996)
-
-
-
-
33
-
-
84974601983
-
Sequential Traitor Tracing
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316-332. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 316-332
-
-
Safavi-Naini, R.1
Wang, Y.2
-
34
-
-
84959043688
-
-
Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 57-75. Springer, Heidelberg (2002)
-
Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57-75. Springer, Heidelberg (2002)
-
-
-
-
35
-
-
0035504864
-
New Results on Frameproof Codes and Traceability Schemes
-
Safavi-Naini, R., Wang, Y.: New Results on Frameproof Codes and Traceability Schemes. IEEE Transactions on Information Theory 47(7), 3029-3033 (2001)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 3029-3033
-
-
Safavi-Naini, R.1
Wang, Y.2
-
36
-
-
35248837412
-
-
Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 81-100. Springer, Heidelberg (2003)
-
Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 81-100. Springer, Heidelberg (2003)
-
-
-
-
37
-
-
77955708529
-
Efficient Traitor Tracing Algorithms Using List Decoding
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Silverberg, A., Staddon, J., Walker, J.L.: Efficient Traitor Tracing Algorithms Using List Decoding. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 175-192. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 175-192
-
-
Silverberg, A.1
Staddon, J.2
Walker, J.L.3
-
38
-
-
0035270516
-
Combinatorial Properties of Frameproof and Traceability Codes
-
Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial Properties of Frameproof and Traceability Codes. IEEE Transactions on Information Theory 47(3), 1042-1049 (2001)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
39
-
-
0002016098
-
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
-
Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Math. 11(1), 41-53 (1998)
-
(1998)
SIAM Journal on Discrete Math
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
41
-
-
24944542406
-
One-Way Chain Based Broadcast Encryption Schemes
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Jho, N., Hwang, J.Y., Hee Cheon, J., Hwan Kim, M., Hoon Lee, D., Sun Yoo, E.: One-Way Chain Based Broadcast Encryption Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 559-574
-
-
Jho, N.1
Hwang, J.Y.2
Hee Cheon, J.3
Hwan Kim, M.4
Hoon Lee, D.5
Sun Yoo, E.6
|