Citation: | SU Jia-jun, WANG Xin-mei. New scheme of dynamic traitor tracing against the immediate rebroadcast attack[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2015, 24(1): 128-132.doi:10.15918/j.jbit1004-0579.201524.0118 |
[1] |
Fiat A, Naor M. Broadcast encryption[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1993.
|
[2] |
Chor B, Fiat A, Naor M. Tracing traitors[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1994:257-270.
|
[3] |
Kurosawa K, Desmedt Y. Optimum traitor tracing and asymmetric scheme[C]//Theory and Application of Cryptographic Techniques-EUROCRYPT, Espoo, Finland, 1998.
|
[4] |
Naor M, Pinkas B. Threshold traitor tracing[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1998.
|
[5] |
Boneh D, Franklin M. An efficient public key traitor tracing scheme[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1999.
|
[6] |
Ma Hua, Cao Zhengwen. Traitor tracing scheme based on the encryption algorithm of RSA[J]. Journal of Xidian University, 2004, 31(4):611-613.(in Chinese)
|
[7] |
Boneh D, Shaw J. Collusion-secure Fingerprinting for Digital Data [J]. IEEE Transactions on Information Theory-TIT, 1998, 44(5):1897-1905.
|
[8] |
Cox I J, Kilian J, Leighton T, et al. A secure, robust watermark for multimedia[C]//Information Hiding, Cambridge, U.K., 1996.
|
[9] |
Fiat A, Tassa T. Dynamic traitor tracing[C]//International Crytology Conference-CRYPTO, Santa Barbara, CA, USA, 1999.
|
[10] |
Safavi-Naini R, Wang Yejing. Sequential traitor tracing [J]. IEEE Transactions on Information Theory, 2003, 49(5):1319-1326.
|