메뉴 건너뛰기




Volumn 6958 LNCS, Issue , 2011, Pages 43-58

An asymmetric fingerprinting scheme based on tardos codes

Author keywords

[No Author keywords available]

Indexed keywords

FINGERPRINTING PROTOCOL; FINGERPRINTING SCHEMES; TARDOS CODE; COLLUSION RESISTANT;

EID: 80053047484     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24178-9_4     Document Type: Conference Paper
Times cited : (35)

References (22)
  • 1
    • 84959049489 scopus 로고    scopus 로고
    • An efficient and practical scheme for privacy protection in the E-commerce of digital goods
    • Won, D. (ed.) ICISC 2000. Springer, Heidelberg
    • Bao, F., Deng, R.H., Feng, P.: An efficient and practical scheme for privacy protection in the E-commerce of digital goods. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 162-170. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2015 , pp. 162-170
    • Bao, F.1    Deng, R.H.2    Feng, P.3
  • 3
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 4
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE, Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 136-145. IEEE, Los Alamitos (2002)
    • (2002) 42nd IEEE Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 5
    • 24144485861 scopus 로고    scopus 로고
    • Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
    • Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
    • Chu, C., Tzeng, W.: Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172-183. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 172-183
    • Chu, C.1    Tzeng, W.2
  • 6
    • 70449671086 scopus 로고    scopus 로고
    • An efficient Buyer-Seller watermarking protocol based on composite signal representation
    • Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient Buyer-Seller watermarking protocol based on composite signal representation. In: ACM MM&Sec 2009, pp. 9-18 (2009)
    • (2009) ACM MM&Sec 2009 , pp. 9-18
    • Deng, M.1    Bianchi, T.2    Piva, A.3    Preneel, B.4
  • 8
    • 80052985605 scopus 로고    scopus 로고
    • Worst case attack against binary probabilistic traitor tracing codes
    • Furon, T., Pérez-Freire, L.: Worst case attack against binary probabilistic traitor tracing codes. In: IEEE WIFS 2009, pp. 46-50 (2009)
    • (2009) IEEE WIFS 2009 , pp. 46-50
    • Furon, T.1    Pérez-Freire, L.2
  • 10
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265-282. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 12
    • 77952507577 scopus 로고    scopus 로고
    • On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
    • Kuribayashi, M.: On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol. EURASIP Journal on Inf. Security (2010)
    • (2010) EURASIP Journal on Inf. Security
    • Kuribayashi, M.1
  • 13
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In:Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 791. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 791
    • Naor, M.1    Pinkas, B.2
  • 14
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • Naor, M., Pinkas, B.: Computationally secure oblivious transfer. Journal of Cryptology 18(1), 1-35 (2005)
    • (2005) Journal of Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 15
    • 70350374371 scopus 로고    scopus 로고
    • Authentic time-stamps for archival storage
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Oprea, A., Bowers, K.D.: Authentic time-stamps for archival storage. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 136-151. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 136-151
    • Oprea, A.1    Bowers, K.D.2
  • 16
    • 84947921515 scopus 로고    scopus 로고
    • Asymmetric fingerprinting
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84-95. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 84-95
    • Pfitzmann, B.1    Schunter, M.2
  • 17
    • 0003462641 scopus 로고
    • Tech. rep., Technical Report TR-81, Harvard Aiken Computation Laboratory
    • Rabin, M.: How to exchange secrets by oblivious transfer. Tech. rep., Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 18
    • 38349016775 scopus 로고    scopus 로고
    • Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
    • Skoric, B., Katzenbeisser, S., Celik, M.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography 46(2), 137-166 (2008)
    • (2008) Designs, Codes and Cryptography , vol.46 , Issue.2 , pp. 137-166
    • Skoric, B.1    Katzenbeisser, S.2    Celik, M.3
  • 19
    • 0038447029 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • ACM, New York
    • Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116-125. ACM, New York (2003), http://www.renyi.hu/~tardos/publications.html
    • (2003) STOC 2003 , pp. 116-125
    • Tardos, G.1
  • 21
    • 0142218971 scopus 로고    scopus 로고
    • Practical t-out-n oblivious transfer and its applications
    • Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. Springer, Heidelberg
    • Wu, Q., Zhang, J., Wang, Y.: Practical t-out-n oblivious transfer and its applications. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 226-237. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2836 , pp. 226-237
    • Wu, Q.1    Zhang, J.2    Wang, Y.3
  • 22
    • 35048900298 scopus 로고    scopus 로고
    • Cryptanalysis of a knapsack based two-lock cryptosystem
    • Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
    • Zhang, B., Wu, H., Feng, D., Bao, F.: Cryptanalysis of a knapsack based two-lock cryptosystem. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 303-309. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3089 , pp. 303-309
    • Zhang, B.1    Wu, H.2    Feng, D.3    Bao, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.