Chor B, Fiat A, and Naor M. Tracing traitors.[J]. Advances in Cryptology-CRYPT9.1994,LNCS:-[2]Kurosawa K and Desmedt Y. Optimum traitor tracing and asymmetric schemes. Proc.of Eurocrypt98, 1998,LNCS, Vol.1403: 145-157.[3]Boneh D and Franklin F. An efficient public key traitor[4]tracing scheme. Proc.[J]. of CRYPTO9.1999,LNCS:-[5]Tzeng Wen-Guey and Tzeng Zhi-Jia. A public-key traitor tracing scheme with revocation using dynamic shares. PKC2001, 2001, LNCS, Vol.1992: 207-224.[6]Kurosawa K and Yoshida T. Linear code implies public-key traitor tracing. PKC02, 2002, LNCS, 2274: 172-187.[7]Kiayias A and Yung M. Traitor tracing with constant transmission rate.[J]. Eurocrypt0.2002,LNCS:-[8]Kiayias A and Yung M. Breaking and repairing asymmetric public-key traitor tracing. 2002 ACM Workshop on DRM, 2003, LNCS, Vol.2696: 32-50.[9]Vu Dong T and Reihaneh Safavi-Naini.Linear code implies public-key traitor tracing with revocation. ACISP 2004, 2004, LNCS, Vol.3108: 24-35. Herv Chabanne, Duong Hieu Phan, and David Pointcheval. Public traceability in traitor tracing schemes. Advances in Cryptology-Proceedings of Eurocrypt05, 2005, LNCS, Vol.3494: 542-558.[10]马华, 曹正文. 基于RSA加密算法的叛逆者追踪方案[J]. 西安电子科技大学学报, 2004, 31(4): 611-613. Ma Hua and Cao Zheng-wen. A traitor tracing scheme based on RSA. Journal of Xidian University(Natural Science), 2004, 31(4): 611-613.[11]McGregor J P, Yin Y L, and Lee R B. A traitor tracing scheme based on RSA for fast decryption. ACNS 2005, 2005, LNCS, Vol.3531: 56-74.[12]Wagstaff Jr. S S. Cryptanalysis of Number Theoretic Cipher[M], Boca Raton, Florida: CRC Press, 2002: 144-153.
|