참고문헌
- M. Naor and B. Pinkas, "Effcient trace and revoke schemes," in Proc. FC. vol. 1962, 2000, pp. 1-20.
- A. Fiat and M. Naor, "Broadcast encryption," in Proc. CRYPTO, vol. 773, 1993, pp. 480-491.
- B. Chor, A. Fiat, and M. Naor, "Tracing traitors," in Proc. CRYPTO, vol. 839, 1994, pp. 257-270.
- D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proc. CRYPTO, vol. 2139, 2001, pp. 41-62.
- D. Halevy and A. Shamir, "The LSD broadcast encryption scheme," in Proc. CRYPTO, vol. 2442, 2002, pp. 47-60.
- M. T. Goodrich, J. Z. Sun, and R. Tamassia, "Effcient tree-based revocation in groups of low-state devices," in Proc. CRYPTO, vol. 2204, 2004, pp.511-527.
- E. Gahai, J. Staddon, and Y. L. Yin, "Efficient methods for integrating traceability and broadcast encryption," in Proc. CRYPTO, vol. 1666, 1999, pp. 372-387.
- W. Tzeng and Z. Tzeng, "A public-key traitor tracing scheme with revocation using dynamic shares," in Proc. PKC, vol. 1992, 2001, pp. 207-224.
- Y. Dodis and N. Fazio, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack," in Proc. PKC, vol. 2696, 2003, pp.100-115.
- D. Boneh and B. Waters, "A fully collusion resistant broadcast, trace, and revoke system," in Proc. ACM-CCS, ACM, 2006, pp. 211-220.
- S. Garg, A. Sahai, and B. Waters. Efficient fully collusion-resilient traitor tracing scheme. Cryptology ePrint Archive. Report 2009/532. [Online]. Available: http://eprint.iacr.org/2009/532/
- D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, vol. 3621, 2005, pp. 258-275.
- J. H. Park, H. J. Kim, M. H. Sung, and D. H. Lee, "Public key broadcast encryption schemes with shorter transmissions," IEEE Trans. Broadcast., vol. 54, no. 3, pp. 401-411, 2008. https://doi.org/10.1109/TBC.2008.919940
- D. Boneh, A. Sahai, and B. Waters, "Fully collusion resistant traitor tracing with short ciphertexts and private keys," in Proc. EUROCYYPT, vol. 4004, 2006, pp. 573-592.
- D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, vol. 2139, 2001, pp. 213-229.
- D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. CRYPTO, vol. 3152, 2004, pp. 41-55.
- M. Scott. (2002). Authenticated id-based key exchange and remote login with simple token and pin number. Cryptology ePrint Archive, Report 2002/164, 2002, [Online]. Available: http://eprint.iacr.org/2002/164/
- S. Galbraith, K. Paterson, and N. Smart, "Pairings for cryptographers," Discrete Appl. Mathematics, vol. 156, no. 16, pp. 3113-3121, 2008. https://doi.org/10.1016/j.dam.2007.12.010
- L. Ducas, "Anonymity from asymmetry: New constructions for anonymous HIBE," in Proc. CT-RSA, vol. 5985, 2010, pp. 148-164.
- S. D. Galbraith, "Supersingular curves in cryptography," in Proc. ASIACRYPT, vol. 2248, 2001, pp. 495-513.
- N. McCullagh and P. S. L. M. Barreto, "A new two-party identity-based authenticated key agreement," in Proc. CT-RSA, 2005, vol. 3376, pp. 262-274.
- J. Camenisch, S. Hohenberger, and A. Lysyanskaya. (2005) Compact ecash, Cryptology ePrint Archive, Report 2005/060. [Online]. Available: http://eprint.iacr.org/2005/060/
- G. Ateniese, J. Camenisch, and B. D. Medeiros, "Untraceable rfid tags via insubvertible encryption," in Proc. ACM-CCS, 2005, pp. 92-101.
- J. H. Park and D. H. Lee, "A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme," in Proc. ISPEC, vol. 4991, 2008, pp. 101-115.
- C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts)," in Proc. EUROCRYPT, vol. 5479, 2009, pp.171-188.
- D. Boneh and M. K. Franklin, "An effcient public key traitor tracing scheme," in Proc. CRYPTO, vol. 1666, 1999, pp. 338-353.
- A. Kiayias and M. Yung, "On crafy pirates and foxy tracers," in Proc. ACM-DRM, 2001, pp. 22-39.