共 12 条
[1]
Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys. Proceedings of Crypto’2005 . 2005
[2]
Chor B,Fiat A,Naor M,et al.Tracing traitors. IEEE Transactions on Information Theory . 2000
[3]
Chor B,Fiat A,Naor M.Tracing Traitors. Advance in Cryptology-CRYPTO’94 . 1994
[4]
Chabanne H,Phan D,Pointcheval D.Public traceability in traitor tracing schemes. Proceedings of Eurocrypt’2005 . 2005
[5]
Boneh D,Sahai A,Waters B.Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Proc.of Eurocrypt’06 . 2006
[6]
Dodis Y,Fazio N.Public key broadcast encryption secure against adaptive chosen ciphertext attack. Proceedings of PKC’03 . 2003
[7]
KUROSAWA K,DESMEDTY.Optimum Traitor Tracing and Asymmetric Schemes. . 1998
[8]
Kiayias A,Yung Moti.Traitor tracing with constanttransmission rate. Proceedings of InternationalConference on the Theory and Applications of Crypto-graphic Techniques . 2002
[9]
Michel A,Alexander W D,Lee J M.Identity-Based traitor tracing. http://www.isg.rhul.ac.uk/~ale x/papers/id-tt.pdf . 2008
[10]
Goldreich O,Goldwasser S,Halevi S.Public-key cryptosystems from lattice reduction problems. Proceedings of Crypto 1997 . 1997