메뉴 건너뛰기




Volumn 9, Issue 6, 2010, Pages 411-424

Efficient trace and revoke schemes

Author keywords

Broadcast encryption; Copyright protection; Self enforcement; Tracing traitors; User revocation

Indexed keywords

BROADCAST ENCRYPTION; COPYRIGHT PROTECTIONS; SELF-ENFORCEMENT; TRACING TRAITORS; USER REVOCATION;

EID: 78649491243     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-010-0121-2     Document Type: Article
Times cited : (14)

References (35)
  • 1
    • 13944258256 scopus 로고    scopus 로고
    • A quick group key distribution scheme with entity revocation
    • LNCS 1716, Springer, Berlin
    • Anzai, J., Matsuzaki, N., Matsumoto, T.: A quick group key distribution scheme with entity revocation. Adv. in Cryptology-Asiacrypt'99. LNCS 1716, pp. 333-347. Springer, Berlin (1999).
    • (1999) Adv. in Cryptology-Asiacrypt'99 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Blakley G. R.: Safeguarding cryptographic keys. AFIPS Conference Proceedings 48, 313-317 (1979).
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 4
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Springer- LNCS 1666, and a full version available at
    • Boneh, D., Franklin, M.: An efficient public key traitor tracing scheme. In: Adv. in Cryptology-Crypto '99, Springer- LNCS 1666 (1999), pp. 338-353, and a full version available at http://crypto. stanford. edu/~dabo/pubs. html.
    • (1999) Adv. in Cryptology-Crypto '99 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0032661699 scopus 로고    scopus 로고
    • Multicast security: A taxonomy and some efficient constructions
    • New York, NY, March
    • Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proceedings of INFOCOM '99, vol. 2, pp. 708-716. New York, NY, March (1999).
    • (1999) Proceedings of INFOCOM '99 , vol.2 , pp. 708-716
    • Canetti, R.1    Garay, J.2    Itkis, G.3    Micciancio, D.4    Naor, M.5    Pinkas, B.6
  • 7
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • LNCS 1592, Springer, Berlin
    • Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Proceedings of Advances in Cryptology-Eurocrypt '99. LNCS 1592, pp. 459-474. Springer, Berlin (1999).
    • (1999) Proceedings of Advances in Cryptology-Eurocrypt '99 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 10
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptove chosen ciphertext attacks
    • LNCS 1462, Springer, Berlin
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptove chosen ciphertext attacks. In: Proceedings of Advances in Cryptology-Crypto '98. LNCS 1462, pp. 13-25. Springer, Berlin (1998).
    • (1998) Proceedings of Advances in Cryptology-Crypto '98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 12
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • Cambridge, UK. LNCS 1174, Springer, Berlin
    • Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. Information Hiding Workshop, Cambridge, UK. LNCS 1174, pp. 185-206. Springer, Berlin (1996).
    • (1996) Information Hiding Workshop , pp. 185-206
    • Cox, I.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 14
    • 0029720071 scopus 로고    scopus 로고
    • Digital signets: Self-enforcing protection of digital information
    • In: 28th
    • Dwork, C., Lotspiech, J., Naor, M.: Digital signets: self-enforcing protection of digital information. In: 28th Symposium on the Theory of Computation, pp. 489-498 (1996).
    • (1996) Symposium on the Theory of Computation , pp. 489-498
    • Dwork, C.1    Lotspiech, J.2    Naor, M.3
  • 15
    • 85032883059 scopus 로고
    • A public key cryptosystem a signature scheme based on discrete logarithms
    • LNCS 196, Springer, Berlin
    • ElGamal, T.: A public key cryptosystem a signature scheme based on discrete logarithms. In: Proceedings of Advances in Cryptology-Crypto '84. LNCS 196, pp. 10-18. Springer, Berlin (1985).
    • (1985) Proceedings of Advances in Cryptology-Crypto '84 , pp. 10-18
    • ElGamal, T.1
  • 17
    • 84979291225 scopus 로고
    • Broadcast encryption
    • LNCS 773, Springer, Berlin
    • Fiat, A., Naor, M.: Broadcast encryption. Advances in Cryptology-CRYPTO '93. LNCS 773, pp. 480-491. Springer, Berlin (1994).
    • (1994) Advances in Cryptology-CRYPTO '93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 18
    • 84957067564 scopus 로고    scopus 로고
    • Efficient methods for integrating traceability and broadcast encryption
    • LNCS 1666 Springer, Berlin
    • Gafni, E., Staddon, J., Yin, Y. L.: Efficient methods for integrating traceability and broadcast encryption. In: Proceedings of Advances in Cryptology-Crypto '99. LNCS 1666, pp. 372-387. Springer, Berlin (1999).
    • (1999) Proceedings of Advances in Cryptology-Crypto '99 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 19
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich O., Goldwasser S., Micali S.: How to construct random functions. J. ACM 33, 792-807 (1986).
    • (1986) J. ACM , vol.33 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 20
    • 84880901368 scopus 로고    scopus 로고
    • Self protecting pirates and black-box traitor tracing
    • LNCS 2139, Springer, Berlin
    • Kiayias, A., Yung, M.: Self protecting pirates and black-box traitor tracing. In: Adv. in Cryptology-Crypto '2001. LNCS 2139, pp. 63-79. Springer, Berlin (2001).
    • (2001) Adv. in Cryptology-Crypto '2001 , pp. 63-79
    • Kiayias, A.1    Yung, M.2
  • 21
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • LNCS 1666 Springer, Berlin
    • Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. Adv. in Cryptology-Crypto '99. LNCS 1666, pp. 609-623. Springer, Berlin (1999).
    • (1999) Adv. in Cryptology-Crypto '99 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 22
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • LNCS 1403 Springer, Berlin
    • Kurosawa, K., Desmedt, Y.: Optimum traitor tracing and asymmetric schemes. In: Advances in Cryptology-Eurocrypt '98. LNCS 1403, pp. 145-157. Springer, Berlin (1998).
    • (1998) Advances in Cryptology-Eurocrypt '98 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A.: How to share a secret. Comm. ACM 22(11), 612-613 (1979).
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 32
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • Stinson D. R., Wei R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J Discret. Math. 11(1), 41-53 (1998).
    • (1998) SIAM J Discret. Math. , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 33
    • 0003259063 scopus 로고    scopus 로고
    • Key Management for Multicast: Issues and Architectures
    • June, Available
    • Wallner, D. M., Harder, E. J., Agee, R. C.: Key Management for Multicast: Issues and Architectures, Internet Request for Comments 2627, June, 1999. Available: ftp. ietf. org/rfc/rfc2627. txt.
    • (1999) Internet Request for Comments 2627
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 35
    • 0032178082 scopus 로고    scopus 로고
    • Secure Group Communications Using Key Graphs
    • Sept. 2-4, Vancouver, Canada
    • Wong, C. K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: Proceeding of ACM Sigcomm '98, Sept. 2-4, pp. 68-79. Vancouver, Canada.
    • Proceeding of ACM Sigcomm '98 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.