Cryptography Reference
In-Depth Information
14. O. Billet and D. H. Phan. Traitors collaborating in public: Pirates 2.0. In
A. Joux, editor, EUROCRYPT, volume 5479 of Lecture Notes in Computer
Science, pages 189-205. Springer, 2009.
15. G. R. Blakley, C. Meadows, and G. B. Purdy. Fingerprinting long forgiving
messages. In H. C. Williams, editor, CRYPTO, volume 218 of Lecture Notes
in Computer Science, pages 180-189. Springer, 1985.
16. D. Boneh and M. K. Franklin. An e
cient public key traitor tracing scheme.
17. D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing.
In J. Kilian, editor, CRYPTO, volume 2139 of Lecture Notes in Computer
Science, pages 213-229. Springer, 2001.
18. D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption
19. D. Boneh and M. Hamburg. Generalized identity based and broadcast encryp-
tion schemes. In J. Pieprzyk, editor, ASIACRYPT, volume 5350 of Lecture
Notes in Computer Science, pages 455-470. Springer, 2008.
20. D. Boneh, A. Kiayias, and H. W. Montgomery. Robust fingerprinting codes : a
near optimal construction. In ACM Workshop on Digital Rights Management,
2010.
21. D. Boneh and M. Naor. Traitor tracing with constant size ciphertext. In
P. Ning, P. F. Syverson, and S. Jha, editors, ACM Conference on Computer
and Communications Security, pages 501-510. ACM, 2008.
22. D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing
with short ciphertexts and private keys. In S. Vaudenay, editor, EUROCRYPT,
volume 4004 of Lecture Notes in Computer Science, pages 573-592. Springer,
2006.
23. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data (ex-
tended abstract). In D. Coppersmith, editor, CRYPTO, volume 963 of Lecture
Notes in Computer Science, pages 452-465. Springer, 1995.
24. D. Boneh and B. Waters. A fully collusion resistant broadcast, trace, and
revoke system. In A. Juels, R. N. Wright, and S. D. C. di Vimercati, editors,
ACM Conference on Computer and Communications Security, pages 211-220.
ACM, 2006.
25. R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Mul-
ticast security: A taxonomy and some e
cient constructions. In INFOCOM,
pages 708-716, 1999.
26. R. Canetti, T. Malkin, and K. Nissim. E
cient communication-storage trade-
offs for multicast encryption. In EUROCRYPT, pages 459-474, 1999.
27. H. Chabanne, D. H. Phan, and D. Pointcheval. Public traceability in traitor
28. B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Y. Desmedt, editor,
CRYPTO, volume 839 of Lecture Notes in Computer Science, pages 257-270.
Springer, 1994.
29. B. Chor, A. Fiat, M. Naor, and B. Pinkas. Tracing traitors. IEEE Transactions
on Information Theory, 46(3):893-910, 2000.
30. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spec-
trum watermarking for multimedia. IEEE Transactions on Image Processing,
6(12):1673-1687, 1997.