Cryptography Reference
In-Depth Information
65. A. Kiayias and S. Pehlivanoglu. Detecting and revoking pirate redistribution
of content. U.S. Patent, Publication Number 2010/0043081, 2010.
66. A. Kiayias and S. Pehlivanoglu. Improving the round complexity of traitor
tracing schemes. In J. Zhou and M. Yung, editors, ACNS, Lecture Notes in
Computer Science, 2010.
pages 22-39.
68. A. Kiayias and M. Yung. Self protecting pirates and black-box traitor tracing.
69. A. Kiayias and M. Yung. Breaking and repairing asymmetric public-key traitor
tracing. In Feigenbaum [
41
], pages 32-50.
70. A. Kiayias and M. Yung. Traitor tracing with constant transmission rate.
In L. R. Knudsen, editor, EUROCRYPT, volume 2332 of Lecture Notes in
Computer Science, pages 450-465. Springer, 2002.
71. A. Kiayias and M. Yung. Public-key traitor tracing from e
cient decoding and
unbounded enrollment: extended abstract. In G. L. Heileman and M. Joye,
editors, Digital Rights Management Workshop, pages 9-18. ACM, 2008.
72. J. Kilian, editor. Advances in Cryptology - CRYPTO 2001, 21st Annual In-
ternational Cryptology Conference, Santa Barbara, California, USA, August
19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science.
Springer, 2001.
73. D. Kirovski and F. A. P. Petitcolas. Replacement attack on arbitrary water-
marking systems. In Feigenbaum [
41
], pages 177-189.
74. N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broad-
cast encryption using smart cards. In IEEE Symposium on Security and Pri-
vacy, pages 225-235. IEEE Computer Society, 2003.
75. H. Komaki, Y. Watanabe, G. Hanaoka, and H. Imai. E
cient asymmetric
self-enforcement scheme with public traceability. In K. Kim, editor, Public
Key Cryptography, volume 1992 of Lecture Notes in Computer Science, pages
225-239. Springer, 2001.
76. R. Kumar, S. Rajagopalan, and A. Sahai. Coding constructions for blacklist-
ing problems without computational assumptions. In M. J. Wiener, editor,
CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 609-623.
Springer, 1999.
77. R. Kumar and A. Russell. A note on the set systems used for broadcast
encryption. In SODA, pages 470-471, 2003.
78. K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric
schemes. In EUROCRYPT, pages 145-157, 1998.
79. K. Kurosawa and T. Yoshida. Linear code implies public-key traitor tracing.
In D. Naccache and P. Paillier, editors, Public Key Cryptography, volume 2274
of Lecture Notes in Computer Science, pages 172-187. Springer, 2002.
80. M. Lee, D. Ma, and M. Seo. Breaking two k-resilient traitor tracing schemes
with sublinear ciphertext size. In Abdalla et al. [
2
], pages 238-252.
81. T. Lindkvist. Fingerprinting Digital Documents. PhD thesis, Linkoping Studies
in Science and Technology, 1999.
82. D. Liu, P. Ning, and K. Sun. E
cient self-healing group key distribution with
revocation capability. In S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM
Conference on Computer and Communications Security, pages 231-240. ACM,
2003.