메뉴 건너뛰기




Volumn 5536 LNCS, Issue , 2009, Pages 253-271

Tracing and revoking pirate rebroadcasts

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED ACCESS CONTENT SYSTEMS; ALPHABET SIZE; BLU-RAY; COMMUNICATION OVERHEADS; CONTENT DISTRIBUTION SYSTEMS; EFFICIENT CONSTRUCTION; FIRST CONSTRUCTIONS; LICENSING AGREEMENT; STATE OF THE ART; TRACING PIRATE;

EID: 68849127956     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01957-9_16     Document Type: Conference Paper
Times cited : (11)

References (41)
  • 2
    • 33646817761 scopus 로고    scopus 로고
    • Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Attrapadung, N., Imai, H.: Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 100-120. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 100-120
    • Attrapadung, N.1    Imai, H.2
  • 4
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public-Key Traitor Tracing Scheme
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 5
    • 33746104815 scopus 로고    scopus 로고
    • Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 6
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-Secure Fingerprinting for Digital Data
    • Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 7
    • 84985922619 scopus 로고
    • Tracing Traitors
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 9
    • 24944511263 scopus 로고    scopus 로고
    • Public Traceability in Traitor Tracing Schemes
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Chabanne, H., Hieu Phan, D., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 542-558
    • Chabanne, H.1    Hieu Phan, D.2    Pointcheval, D.3
  • 11
    • 35248901924 scopus 로고    scopus 로고
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2003)
    • Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
  • 13
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 14
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic Traitor Tracing
    • Fiat, A., Tassa, T.: Dynamic Traitor Tracing. Journal of Cryptology 4(3), 211-223 (2001)
    • (2001) Journal of Cryptology , vol.4 , Issue.3 , pp. 211-223
    • Fiat, A.1    Tassa, T.2
  • 15
    • 38749132987 scopus 로고    scopus 로고
    • Explicit Exclusive Set Systems with Applications to Broadcast Encryption
    • Gentry, C., Ramzan, Z., Woodruff, D.P.: Explicit Exclusive Set Systems with Applications to Broadcast Encryption. In: FOCS 2006, pp. 27-38 (2006)
    • (2006) FOCS 2006 , pp. 27-38
    • Gentry, C.1    Ramzan, Z.2    Woodruff, D.P.3
  • 16
    • 84957067564 scopus 로고    scopus 로고
    • Efficient Methods for Integrating Traceability and Broadcast Encryption
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Gafni, E., Staddon, J., Lisa Yin, Y.: Efficient Methods for Integrating Traceability and Broadcast Encryption. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 372-387. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Lisa Yin, Y.3
  • 17
    • 84974588069 scopus 로고    scopus 로고
    • Long-Lived Broadcast Encryption
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Garay, J.A., Staddon, J., Wool, A.: Long-Lived Broadcast Encryption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 333-352. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 333-352
    • Garay, J.A.1    Staddon, J.2    Wool, A.3
  • 18
    • 24944584332 scopus 로고    scopus 로고
    • Efficient Tree-Based Revocation in Groups of Low-State Devices
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient Tree-Based Revocation in Groups of Low-State Devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511-527. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 19
    • 84937435227 scopus 로고    scopus 로고
    • The LSD Broadcast Encryption Scheme
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 20
    • 38049019851 scopus 로고    scopus 로고
    • Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Jin, H., Lotspiech, J.: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 563-577. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 563-577
    • Jin, H.1    Lotspiech, J.2
  • 22
    • 84880901368 scopus 로고    scopus 로고
    • Self Protecting Pirates and Black-Box Traitor Tracing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 63-79. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 63-79
    • Kiayias, A.1    Yung, M.2
  • 23
    • 84959054452 scopus 로고    scopus 로고
    • Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 22-39. Springer, Heidelberg (2002)
    • Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
  • 24
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Kiayias, A., Yung, M.: Traitor tracing with constant transmission rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 25
    • 38049163807 scopus 로고    scopus 로고
    • Pirate Evolution: How to Make the Most of Your Traitor Keys
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Kiayias, A., Pehlivanoglu, S.: Pirate Evolution: How to Make the Most of Your Traitor Keys. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 448-465. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 448-465
    • Kiayias, A.1    Pehlivanoglu, S.2
  • 26
    • 35248866858 scopus 로고    scopus 로고
    • Optimum Traitor Tracing and Asymmetric Schemes
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 145-157. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 27
    • 33746085504 scopus 로고    scopus 로고
    • Le, T.V., Burmester, M., Hu, J.: Short c-Secure Fingerprinting Codes. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 422-427. Springer, Heidelberg (2003)
    • Le, T.V., Burmester, M., Hu, J.: Short c-Secure Fingerprinting Codes. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 422-427. Springer, Heidelberg (2003)
  • 28
    • 33746382900 scopus 로고    scopus 로고
    • Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Micciancio, D., Panjwani, S.: Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 70-82. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 70-82
    • Micciancio, D.1    Panjwani, S.2
  • 29
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Naor, D., Naor, M., Lotspiech, J.B.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.B.3
  • 30
    • 84957617696 scopus 로고    scopus 로고
    • Threshold Traitor Tracing
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 502-517. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 31
    • 84944319284 scopus 로고    scopus 로고
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, 1962, pp. 1-20. Springer, Heidelberg (2001)
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
  • 32
    • 68849107877 scopus 로고    scopus 로고
    • Hieu Phan, D., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 49-63. Springer, Heidelberg (1996)
    • Hieu Phan, D., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 49-63. Springer, Heidelberg (1996)
  • 33
    • 84974601983 scopus 로고    scopus 로고
    • Sequential Traitor Tracing
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Safavi-Naini, R., Wang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316-332. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 316-332
    • Safavi-Naini, R.1    Wang, Y.2
  • 34
    • 84959043688 scopus 로고    scopus 로고
    • Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 57-75. Springer, Heidelberg (2002)
    • Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57-75. Springer, Heidelberg (2002)
  • 35
    • 0035504864 scopus 로고    scopus 로고
    • New Results on Frameproof Codes and Traceability Schemes
    • Safavi-Naini, R., Wang, Y.: New Results on Frameproof Codes and Traceability Schemes. IEEE Transactions on Information Theory 47(7), 3029-3033 (2001)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 3029-3033
    • Safavi-Naini, R.1    Wang, Y.2
  • 36
    • 35248837412 scopus 로고    scopus 로고
    • Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 81-100. Springer, Heidelberg (2003)
    • Safavi-Naini, R., Wang, Y.: Traitor Tracing for Shortened and Corrupted Fingerprints. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 81-100. Springer, Heidelberg (2003)
  • 37
    • 77955708529 scopus 로고    scopus 로고
    • Efficient Traitor Tracing Algorithms Using List Decoding
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Silverberg, A., Staddon, J., Walker, J.L.: Efficient Traitor Tracing Algorithms Using List Decoding. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 175-192. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 175-192
    • Silverberg, A.1    Staddon, J.2    Walker, J.L.3
  • 39
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
    • Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Math. 11(1), 41-53 (1998)
    • (1998) SIAM Journal on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 41
    • 24944542406 scopus 로고    scopus 로고
    • One-Way Chain Based Broadcast Encryption Schemes
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Jho, N., Hwang, J.Y., Hee Cheon, J., Hwan Kim, M., Hoon Lee, D., Sun Yoo, E.: One-Way Chain Based Broadcast Encryption Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 559-574
    • Jho, N.1    Hwang, J.Y.2    Hee Cheon, J.3    Hwan Kim, M.4    Hoon Lee, D.5    Sun Yoo, E.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.