References
- Proc.Advances in Cryptology -Asiacrypt'99.of Lecture Notes in Computer Science v.1716 A Quick Group Key Distribution Scheme with Entity Revocation J.Anzai;N.Matsuzaki;T.Matsumoto
- Proc.Advances in Cryptology-Crypto'99.of Lecture Notes in Computer Science v.1666 An Efficient Public Key Traitor Tracing Scheme D.Boneh;M.Franklin
- Proc.Advances in Cryptology-Crypto'99.of Lecture Notes in Computer Science v.839 Tracing Traitors B.Chor;A.Fiat;M.Naor
- 28th Symposium on the Theory of Computation'96 Digital Signets: Self-Enforcing Protection of Digital Imfromation C.Dwork;J.Lotspiech;M.Naor
- Proc.Advances in Cryptology-Eurocrypt'98.of Lecture Notes in Computer Science v.1403 Optimum Traitor Tracing and Asymmetric Schemes K.Kurosawa;Y.Desmedt
- Handbook of Applied Cryptography A.J.Menezes;P.C.van Oorschot;S.A.Vanstone
- Proc.Finalcial Cryptography'00.Anguilla. Efficient Trace and Revoke Schemes M.Naor;B.Pinkas
- International Worshop on Practice and Theory in Public-Key Cryptography-RKC'01.of Lecture Notes in Computer Science v.1992 The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes T.Okamoto;D.Pointcheval
- The Cryptographers'Tranck of the RSA Conference '2001.of Lecture Notes in Computer Science v.2020 REACT:Rapid Enhanced-security Asymmetric Cryptosystem Transform T.Okamoto;D.Pointcheval
- Proc.Workshop in Information Hiding.of Lecture Notes in Computer Science v.1174 Trials of Traced Traitors B.Pfitzmann
- Comm ACM v.22 no.11 How to Share a Secret A.Shamir
- Cryptography Theory and Practice D.R.Stinson
- International Workshop on Practice and Theory in Public-Key Cryptography-PKC'01.of Lecture Notes in Computer Science v.1992 A Public-Key Traitor Tracing Scheme with Revocation using Dynamic Shares W.Tzeng;Z.J.Tzeng