-
1
-
-
35248866858
-
Optimum traitor tracing and asymmetric scheme
-
K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric scheme. In Proc. of EUROCRYPT '98, pages 145-157, 1998.
-
(1998)
Proc. of EUROCRYPT '98
, pp. 145
-
-
Kurosawa, K.1
Desmedt, Y.2
-
3
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
D. Boneh and M. Franklin. An efficient public key traitor tracing scheme. In Proc. of CRYPTO'99, pages 338-353, 1999.
-
(1999)
Proc. of CRYPTO'99
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
85085849251
-
A subscriber unauthorizable and traitor traceable broadcast distribution system
-
M. Yoshida and T. Fujiwara. A subscriber unauthorizable and traitor traceable broadcast distribution system. In Proc. of SCIS'2000, page C10, 2000.
-
(2000)
Proc. of SCIS'2000
-
-
Yoshida, M.1
Fujiwara, T.2
-
6
-
-
0030704505
-
Asymmetric fingerprinting for larger collusions
-
B. Pfitzmann and M. Waidner. Asymmetric fingerprinting for larger collusions. In Proc. of ACMCCS'97, pages 145-157, 1997.
-
(1997)
Proc. of ACMCCS'97
, pp. 145-157
-
-
Pfitzmann, B.1
Waidner, M.2
-
7
-
-
84890047469
-
Key predistribution traceability schemes for broadcast encryption
-
D. Stinson and R. Wei. Key predistribution traceability schemes for broadcast encryption. In Proc. of SAC'98, pages 144-156, 1999.
-
(1999)
Proc. of SAC'98
, pp. 144-156
-
-
Stinson, D.1
Wei, R.2
-
8
-
-
13944258256
-
A quick group key distribution scheme with entity revocation
-
J. Anzai, N. Matsuzaki, and T. Matsumoto. A quick group key distribution scheme with entity revocation. In Proc. of ASIACRYPT'99, pages 333-347, 1999.
-
(1999)
Proc. of ASIACRYPT'99
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
9
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In Proc. Of STOC'99, pages 245-254, 1999.
-
(1999)
Proc. of STOC'99
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
10
-
-
84948951675
-
Noisy polynomial interpolation and noisy chinese remaindering
-
D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In Proc. of EUROCRYPT'2000, pages 53-69, 2000.
-
(2000)
Proc. of EUROCRYPT'2000
, pp. 53-69
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Proc. of CRYPTO'86, pages 186-194, 1986.
-
(1986)
Proc. of CRYPTO'86
, pp. 186
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In Proc. Of EUROCRYPT'89, pages 688-689, 1989.
-
(1989)
Proc. of EUROCRYPT'89
, pp. 689
-
-
Schnorr, C.P.1
-
16
-
-
84937613511
-
Black-box traitor tracing against arbitrary pirate decoders
-
to appear
-
T. Matsushita and H. Imai. Black-box traitor tracing against arbitrary pirate decoders. In Proc. of WISA'00, to appear, 2000.
-
(2000)
Proc. of WISA'00
-
-
Matsushita, T.1
Imai, H.2
-
18
-
-
0034448240
-
An efficient traitor tracing scheme for broadcast encryption
-
M. Yoshida and T. Fujiwara. An efficient traitor tracing scheme for broadcast encryption. In Proc. of IEEE ISIT'2000, page 463, 2000.
-
(2000)
Proc. of IEEE ISIT'2000
, pp. 463
-
-
Yoshida, M.1
Fujiwara, T.2
-
19
-
-
84947778144
-
The decision Diffe-Hellman problem
-
D. Boneh. The decision Diffe-Hellman problem. In Proc. of the 3th ANTS, pages 48-63, 1998.
-
(1998)
Proc. of the 3Th ANTS
, pp. 48-63
-
-
Boneh, D.1
-
20
-
-
84957617696
-
Threshold traitor tracing
-
M. Naor and B. Pinkas. Threshold traitor tracing. In Proc. of CRYPTO'98, pages 502-517, 1998.
-
(1998)
Proc. of CRYPTO'98
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
21
-
-
0002681959
-
Untraceable off-line cash in wallets with observers
-
S. Brands. Untraceable off-line cash in wallets with observers. In Proc. Of CRYPTO'93, pages 302-318, 1993.
-
(1993)
Proc. of CRYPTO'93
, pp. 302
-
-
Brands, S.1
-
22
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. of ACM, 22:612-613, 1979.
-
(1979)
Comm. of ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
22044454382
-
Distributed public key cryptography
-
Y. Frankel and M. Yung. Distributed public key cryptography. In Proc. of PKC'98, pages 1-13, 1998.
-
(1998)
Proc. of PKC'98
, pp. 1-13
-
-
Frankel, Y.1
Yung, M.2
-
24
-
-
84937613513
-
Efficient asymmetric self-enforcement scheme with public traceability
-
to appear
-
H. Komaki, Y. Watanabe, G. Hanaoka, and H. Imai. Efficient asymmetric self-enforcement scheme with public traceability. In Proc. of PKC'01, to appear, 2001.
-
(2001)
Proc. of PKC'01
-
-
Komaki, H.1
Watanabe, Y.2
Hanaoka, G.3
Imai, H.4
|