메뉴 건너뛰기




Volumn 1200, Issue , 1997, Pages 399-412

Protocols for collusion-secure asymmetric fingerprinting: Extended abstract

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS;

EID: 84947916599     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0023476     Document Type: Conference Paper
Times cited : (20)

References (18)
  • 1
    • 33746365751 scopus 로고
    • Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority
    • D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, 1991, pp. 75-122.
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 2
    • 84947942283 scopus 로고
    • Fingerprinting Long Forgiving Messages
    • Springer
    • G.R. Blakeley, C. Meadows, G.B. Purdy, Fingerprinting Long Forgiving Messages, Proc. CRYPTO'85, Springer, 1986, pp. 180-189.
    • (1986) Proc. CRYPTO'85 , pp. 180-189
    • Blakeley, G.R.1    Meadows, C.2    Purdy, G.B.3
  • 3
    • 84957670625 scopus 로고
    • Collusion-Secure Fingerprinting for Digital Data
    • Springer
    • Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data, Proc. CRYPTO'95, Springer, 1995, pp. 452-465.
    • (1995) Proc. CRYPTO'95 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 6
    • 0002152920 scopus 로고
    • Assuring Ownership Rights for Digital Images
    • Wiesbaden
    • Germano Caronni, Assuring Ownership Rights for Digital Images, Proc. Verläfiliche Informa,tionssysteme'95, Wiesbaden, 1995, pp. 251-263.
    • (1995) Proc. Verläfiliche Informa,tionssysteme'95 , pp. 251-263
    • Caronni, G.1
  • 7
    • 0002859474 scopus 로고
    • Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result
    • Springer
    • D. Chaum, I. Damgard, J. van de Graaf, Multiparty Computations Ensuring Privacy of each Party's Input and Correctness of the Result, Proc. CRYPTO'87, Springer, 1988, pp. 88-119.
    • (1988) Proc. CRYPTO'87 , pp. 88-119
    • Chaum, D.1    Damgard, I.2    van de Graaf, J.3
  • 8
  • 9
    • 77952175010 scopus 로고    scopus 로고
    • Digital Signets: Self-Enforcing Protection of Digital Information
    • C. Dwork, J. Lotspiech, M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, Proc. 28th STOC, 1996.
    • (1996) Proc. 28th STOC
    • Dwork, C.1    Lotspiech, J.2    Naor, M.3
  • 11
    • 0002337124 scopus 로고
    • Towards a Theory of Software Protection and Simulation by Oblivious RAMs
    • O. Goldreich. Towards a Theory of Software Protection and Simulation by Oblivious RAMs, Proc. 19th STOC, 1987, pp. 218-229.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1
  • 13
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • S. Goldwasser, S. Micali, C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, Vol. 18, No. 1, 1989, pp. 186-208.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 14
    • 84944981072 scopus 로고
    • An efficient Software Protection Scheme
    • Springer
    • Rafail Ostovsky, An efficient Software Protection Scheme, Proc. CRYPTO'89, Springer, 1990, pp. 610-611.
    • (1990) Proc. CRYPTO'89 , pp. 610-611
    • Ostovsky, R.1
  • 15
    • 0002007986 scopus 로고    scopus 로고
    • Trials of Traced Traitors (Extended Abstract)
    • Cambridge, UK, Proc. to appear in LNCS, Springer
    • Birgit Pfitzmann, Trials of Traced Traitors (Extended Abstract), Proc. Workshop on Information Hiding, Cambridge, UK, 1996, Proc. to appear in LNCS, Springer.
    • (1996) Proc. Workshop on Information Hiding
    • Pfitzmann, B.1
  • 17
    • 0030704505 scopus 로고    scopus 로고
    • Asymmetric Fingerprinting for Larger Collusions
    • to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich
    • Birgit Pfitzmann, Michael Waidner, Asymmetric Fingerprinting for Larger Collusions, Proc. of the 4th ACM Conference on Computer and Communications Security, 1997, to appear; preliminary Version IBM Research Report RZ 2857 (#90805) 08/19/96, IBM Research Division, Zürich.
    • (1997) Proc. of the 4th ACM Conference on Computer and Communications Security
    • Pfitzmann, B.1    Waidner, M.2
  • 18
    • 0023568495 scopus 로고
    • Random Self-Reducïbility and Zero-Knowledge Interactive Proofs of Possession of Information
    • M. Tompa, H. Woll, Random Self-Reducïbility and Zero-Knowledge Interactive Proofs of Possession of Information, Proc. 28th FOCS, 1987, pp. 472-482.
    • (1987) Proc. 28th FOCS , pp. 472-482
    • Tompa, M.1    Woll, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.