1. Fiat A, Naor M. Broadcast encryption. Proceedings of 13th Annual International Cryptology Conference (Crypto’93), Aug 22-26, 1993, Santa Barbara, CA, USA. Berlin: Springer, 1993: 480-491
2. Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. Proceedings of 21st Annual International Cryptology Conference (Crypto’01), Aug 19-23, 2001, Santa Barbara, CA, USA. Berlin: Springer, 2001: 41-62
3. Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers. Proceedings of 2002 ACM Workshop Digital Rights Management (DRM’02), Nov 18, 2002, Washington, DC, USA. Berlin: Springer, 2003: 61-80
4. Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. Proceedings of 25th Annual International Cryptology Conference (Crypto’05), Aug 14-18, 2005, Santa Barbara, CA, USA. Berlin: Springer, 2005: 258-275
5. Weng J, Liu S, Chen K. Pirate decoder for the broadcast encryption schemes from Crypto 2005. Science in China: F-Information Sciences, 2007, 50 (3): 318-323
6. Halevy D, Shamir A. The LSD broadcast encryption scheme. Proceedings of 22nd Annual International Cryptology Conference (Crypto’02), Aug 18-22, 2002, Santa Barbara, CA, USA. Berlin: Springer, 2002: 47-60
7. Michael T G, Jonathan Z S, Roberto T. Efficient tree-based revocation in groups of low-state devices. Proceedings of 24st Annual International Cryptology Conference (Crypto’04), Aug 15-19, 2004, Santa Barbara, CA, USA. Berlin: Springer, 2004: 511-527
8. Chor B, Fiat A, Naor M, et al. Tracing traitors. IEEE Transactions on Information Theory, 2000, 46(3): 893-910
9. Chor B, Fiat A, Naor M. Tracing traitors. Proceedings of 14st Annual International Cryptology Conference (Crypto’94), Aug 21-25, 1994, Santa Barbara, CA, USA. Berlin: Springer, 1994: 257-270
10. McGregor J P, Yin Y L, Lee R B. A traitor tracing scheme basedon RSA for fast decryption. Proceedings of 3rd Applied Cryptography and Network Security Conference (ACNS 2005), Jun 7-10, 2005, New York, NY, USA. Berlin: Springer, 2005: 56-74
11. Boneh D. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society, 1999, 46(2): 203-213
12. Fujisake E, Okamoto T, Pointcheval D, et al. RSA-OAEP is secure under the RSA assumption. Proceedings of 21st Annual International Cryptology Conference (Crypto’01), Aug 19-23, 2001, Santa Barbara, CA, USA. Berlin: Springer, 2001: 260-274
13. Coron J S, Joye M, Naccache D, et al. Universal padding scheme for RSA. Proceedings of 22nd Annual International Cryptology Conference (Crypto’02), Aug 18-22, 2002, Santa Barbara, CA, USA. Berlin: Springer, 2002: 226-241
14. Tzeng W G, Tzeng Z J. A public-key traitor tracing scheme with revocation using dynamic shares. Proceeding of 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC’01), Feb 13-15, 2001, Cheju Island, Korea. Berlin: Springer, 2001: 207-224
15. Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Proceedings of 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC’03), Jan 9-10, 2003, Miami, FL, USA. Berlin: Springer, 2003: 100-115 |