메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 338-353

An efficient public key traitor tracing scheme

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957085257     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_22     Document Type: Conference Paper
Times cited : (240)

References (16)
  • 1
    • 85024585723 scopus 로고    scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • M. Bellare, O. Goldreich, and S. Goldwasser, “Incremental cryptography: The case of hashing and signing”, in proc. Crypto '94, 216-233.
    • Proc. Crypto '94 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 5
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack”, in proc. Crypto '98, pp. 13-25.
    • Proc. Crypto '98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 6
    • 0029720071 scopus 로고    scopus 로고
    • Digital signets: Self-enforcing protection of digital information
    • C. Dwork, J. Lotspiech and M. Naor, “Digital signets: self-enforcing protection of digital information”, in proc. of STOC '96, pp. 489-498, 1996.
    • (1996) Proc. Of STOC '96 , pp. 489-498
    • Dwork, C.1    Lotspiech, J.2    Naor, M.3
  • 8
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • K. Kurosawa, and Y. Desmedt, “Optimum traitor tracing and asymmetric schemes”, in proc. of Eurocrypt '98, pp. 145-157.
    • Proc. Of Eurocrypt '98 , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 10
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • M. Naor and B. Pinkas, “Threshold traitor tracing”, in proc. Crypto '98, pp. 502-517.
    • Proc. Crypto '98 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 11
    • 84956852274 scopus 로고    scopus 로고
    • A new public key cryptosystem as secure as factoring
    • T. Okamoto, S. Uchiyama, “A new public key cryptosystem as secure as factoring”, in proc. Eurocrypt '98, pp. 308-318.
    • Proc. Eurocrypt '98 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 12
    • 0030643066 scopus 로고    scopus 로고
    • Faster solution of the key equation for decoding BCH error-correcting codes
    • V. Pan, “Faster solution of the key equation for decoding BCH error-correcting codes” in proc. 29th ACM Symposium on Theory of Computation, pp. 168-175, 1997.
    • (1997) Proc. 29Th ACM Symposium on Theory of Computation , pp. 168-175
    • Pan, V.1
  • 13
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Discrete Logarithm Residues
    • P. Paillier, “Public-Key Cryptosystems Based on Discrete Logarithm Residues”, in proc. Eurocrypt '99, pp. 223-238.
    • Proc. Eurocrypt '99 , pp. 223-238
    • Paillier, P.1
  • 16
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. Stinson and R. Wei, “Combinatorial properties and constructions of traceability schemes and frameproof codes”, SIAM Journal on Discrete Math, 11(1), 41-53, 1998.
    • (1998) SIAM Journal on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.1    Wei, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.