Computer Science ›› 2013, Vol. 40 ›› Issue (8): 96-99.
Previous Articles Next Articles
SU Jia-jun and WANG Xin-mei
[1] Fiat A,Naor M.Broadcast encryption [A]∥Advance in Cryptology-CRYPTO’93[C].vol.773,Berlin,Germany:Springer-Verlag,1994:480-491 [2] Chor B,Fiat A,Naor M.Tracing traitors[A]∥Advance in Cryptology-CRYPTO’94[C].vol.839, Berlin,Germany:Sprin-ger-Verlag,1994:257-270 [3] Naor M,Pinkas B.Threshold traitor tracing [A]∥CRYPTO’98[C].vol.1462,Berlin:Springer-Verlag,1998:502-517 [4] Kurosawa K,Desmedt Y.Optimum traitor tracing and asymme-tric scheme [A]∥Advances in Cryptology-EUROCRYPT’98[C]. vol.1403,Berlin:Springer-Verlag,1998:145-157 [5] Boneh D,Franklin M.An efficient public key traitor tracingscheme [A]∥CRYPT’99[C].vol.1666,Berlin,Germany:Springer-Verlag,1999:338-353 [6] Fiat A,Tassa T.Dynamic traitor tracing [A]∥Advance inCryptology-CRYPTO’99[C].vol.1999,Berlin,Germany:Springer-Verlag,1666:354-371 [7] Safavi-Naini R,Wang Ye-jing.Squential traitor tracing [A]∥Advance in Cryptology-CRYPTO2000[C].vol.1880,Berlin,Germany:Springer-Verlag,2000:316-332 [8] Goldreich O,Goldwasser S,Micali S.How to construct random functions [J].J.Assoc.Comput,1986,33(4):792-807 [9] Mu Ning-bo,Hu Yu-pu,Ou Hai-wen.Broadcast encryption sch-emes based on RSA[J].The Journal of China Universities of Posts and Telecommunications,2009,16(1):69-75 [10] Wu Yong-dong,Deng R H.A Multi-Key Pirate Decoder against Traitor Tracing Schemes [J].Journal of Computer Science and Technology,2010,25(2):362-374 |
No related articles found! |
|