메뉴 건너뛰기




Volumn 2020, Issue , 2001, Pages 392-407

Efficient asymmetric public-key traitor tracing without trusted agents

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84937577268     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45353-9_29     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 1
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric scheme
    • K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric scheme. In Proc. of EUROCRYPT '98, pages 145-157, 1998.
    • (1998) Proc. of EUROCRYPT '98 , pp. 145
    • Kurosawa, K.1    Desmedt, Y.2
  • 3
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • D. Boneh and M. Franklin. An efficient public key traitor tracing scheme. In Proc. of CRYPTO'99, pages 338-353, 1999.
    • (1999) Proc. of CRYPTO'99 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 4
    • 85085849251 scopus 로고    scopus 로고
    • A subscriber unauthorizable and traitor traceable broadcast distribution system
    • M. Yoshida and T. Fujiwara. A subscriber unauthorizable and traitor traceable broadcast distribution system. In Proc. of SCIS'2000, page C10, 2000.
    • (2000) Proc. of SCIS'2000
    • Yoshida, M.1    Fujiwara, T.2
  • 6
    • 0030704505 scopus 로고    scopus 로고
    • Asymmetric fingerprinting for larger collusions
    • B. Pfitzmann and M. Waidner. Asymmetric fingerprinting for larger collusions. In Proc. of ACMCCS'97, pages 145-157, 1997.
    • (1997) Proc. of ACMCCS'97 , pp. 145-157
    • Pfitzmann, B.1    Waidner, M.2
  • 7
    • 84890047469 scopus 로고    scopus 로고
    • Key predistribution traceability schemes for broadcast encryption
    • D. Stinson and R. Wei. Key predistribution traceability schemes for broadcast encryption. In Proc. of SAC'98, pages 144-156, 1999.
    • (1999) Proc. of SAC'98 , pp. 144-156
    • Stinson, D.1    Wei, R.2
  • 8
    • 13944258256 scopus 로고    scopus 로고
    • A quick group key distribution scheme with entity revocation
    • J. Anzai, N. Matsuzaki, and T. Matsumoto. A quick group key distribution scheme with entity revocation. In Proc. of ASIACRYPT'99, pages 333-347, 1999.
    • (1999) Proc. of ASIACRYPT'99 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 9
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In Proc. Of STOC'99, pages 245-254, 1999.
    • (1999) Proc. of STOC'99 , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 10
    • 84948951675 scopus 로고    scopus 로고
    • Noisy polynomial interpolation and noisy chinese remaindering
    • D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In Proc. of EUROCRYPT'2000, pages 53-69, 2000.
    • (2000) Proc. of EUROCRYPT'2000 , pp. 53-69
    • Bleichenbacher, D.1    Nguyen, P.Q.2
  • 12
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Proc. of CRYPTO'86, pages 186-194, 1986.
    • (1986) Proc. of CRYPTO'86 , pp. 186
    • Fiat, A.1    Shamir, A.2
  • 13
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • C. P. Schnorr. Efficient identification and signatures for smart cards. In Proc. Of EUROCRYPT'89, pages 688-689, 1989.
    • (1989) Proc. of EUROCRYPT'89 , pp. 689
    • Schnorr, C.P.1
  • 16
    • 84937613511 scopus 로고    scopus 로고
    • Black-box traitor tracing against arbitrary pirate decoders
    • to appear
    • T. Matsushita and H. Imai. Black-box traitor tracing against arbitrary pirate decoders. In Proc. of WISA'00, to appear, 2000.
    • (2000) Proc. of WISA'00
    • Matsushita, T.1    Imai, H.2
  • 18
    • 0034448240 scopus 로고    scopus 로고
    • An efficient traitor tracing scheme for broadcast encryption
    • M. Yoshida and T. Fujiwara. An efficient traitor tracing scheme for broadcast encryption. In Proc. of IEEE ISIT'2000, page 463, 2000.
    • (2000) Proc. of IEEE ISIT'2000 , pp. 463
    • Yoshida, M.1    Fujiwara, T.2
  • 19
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffe-Hellman problem
    • D. Boneh. The decision Diffe-Hellman problem. In Proc. of the 3th ANTS, pages 48-63, 1998.
    • (1998) Proc. of the 3Th ANTS , pp. 48-63
    • Boneh, D.1
  • 20
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • M. Naor and B. Pinkas. Threshold traitor tracing. In Proc. of CRYPTO'98, pages 502-517, 1998.
    • (1998) Proc. of CRYPTO'98 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 21
    • 0002681959 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • S. Brands. Untraceable off-line cash in wallets with observers. In Proc. Of CRYPTO'93, pages 302-318, 1993.
    • (1993) Proc. of CRYPTO'93 , pp. 302
    • Brands, S.1
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of ACM, 22:612-613, 1979.
    • (1979) Comm. of ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 22044454382 scopus 로고    scopus 로고
    • Distributed public key cryptography
    • Y. Frankel and M. Yung. Distributed public key cryptography. In Proc. of PKC'98, pages 1-13, 1998.
    • (1998) Proc. of PKC'98 , pp. 1-13
    • Frankel, Y.1    Yung, M.2
  • 24
    • 84937613513 scopus 로고    scopus 로고
    • Efficient asymmetric self-enforcement scheme with public traceability
    • to appear
    • H. Komaki, Y. Watanabe, G. Hanaoka, and H. Imai. Efficient asymmetric self-enforcement scheme with public traceability. In Proc. of PKC'01, to appear, 2001.
    • (2001) Proc. of PKC'01
    • Komaki, H.1    Watanabe, Y.2    Hanaoka, G.3    Imai, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.