91
Views
2
CrossRef citations to date
0
Altmetric
SECTION B

A blind signature-based protocol for tracing traitors

, &
Pages 1764-1774 | Received 22 Aug 2013, Accepted 28 Jan 2014, Published online: 27 Mar 2014

References

  • D. Boneh and M. Franklin, An efficient public key traitor tracing scheme, in Advances in Cryptology – CRYPTO’99, Santa Barbara, CA, USA, 15–19 August, Michael Wiener, ed., Springer, Heidelberg, Berlin, 1999, pp. 338–353.
  • K.-Ch. Chan and S.-H.G. Chan, Key management approaches to offer data confidentiality for secure multicast, IEEE Netw. 17 (2003), pp. 30–39. doi: 10.1109/MNET.2003.1233915
  • D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Advances in Cryptology – CRYPTO’90, Springer-Verlag, New York, NY, 1990.
  • D. Chaum, Blind signatures for untraceable payments, in Advances in Cryptology – CRYPTO’82. Santa Barbara, CA, USA, August, David Chaum, Ronald L. Rivest, and Alan T. Sherman, eds., Springer US, New York, 1983, pp. 199–203.
  • D. Chaum, Secret-ballot receipts: True voter-verifiable elections, IEEE Secur. Privacy 2 (2004), pp. 38–47. doi: 10.1109/MSECP.2004.1264852
  • G.-H. Chiou and W.-T. Chen, Secure broadcasting using the secure lock, IEEE Trans. Softw. Eng. 15 (1989), pp. 929–934. doi: 10.1109/32.31350
  • Y. Ding and L. Fan, Traitor Tracing and Revocation Mechanisms with Privacy-Preserving, Seventh International Conference on Computational Intelligence and Security (CIS 2011), China, 2011.
  • C. Dwork, J. Lotspiech, and M. Naor, Digital signets: Self-enforcing protection of digital information, in 28th ACM Symposium on the Theory of Computing, Philadephia, PA, USA, 22–24 May, Gary L. Miller, ed., ACM, New York, 1996, pp. 489–498.
  • S. Gueron. Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel Core Processors. Information Technology: New Generations (ITNG), Las Vegas, NV, 16–18 April, Shahram Latifi, ed., IEEE Computer Society, Los Alamitos, CA, 2012, pp. 824–826.
  • L. Kale, A. Arya, A. Bhatele, A. Gupta, N. Jain, and P. Jetley, Charm++ for Productivity and Performance: A Submission to the 2011 HPC Class II Challenge 2011, HPC Class II Challenge, Knoxville, TN, 2011.
  • A. Kiayias and M.Yung, Breaking and repairing asymmetric public-key traitor tracing, in Proceedings DRM 2002, Washington, DC, USA, 18 November 2002, Joan Feigenbaum, ed., Springer, Heidelberg, Berlin, 2003, pp. 32–50.
  • B. Liu, W. Zhang, and T. Jiang, A scalable key distribution scheme for conditional access system in digital pay-TV system, IEEE Trans. Consum. Electron. 50 (2004), pp. 632–637. doi: 10.1109/TCE.2004.1309442
  • X. Lou and K. Hwang, Collusive piracy prevention in P2P content delivery, IEEE Trans. Comput. 58 (2009), pp. 970–983. doi: 10.1109/TC.2009.26
  • M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, in Financial Cryptography (3110), Y. Frankel, ed., Springer, Heidelberg, Berlin, 2001, pp. 1–20.
  • D. Naor, M. Naor, and J. Lotspiech, Revocation and tracing schemes for stateless receivers, in Advances in Cryptology – CRYPTO 2001, Santa Barbara, CA, USA, 19–23 August, Joe Kilian, ed., Springer, Heidelberg, Berlin, 2001, pp. 41–62.
  • M. Naor and B. Pinkas, Efficient trace and revoke schemes, Int. J. Inform. Secur. 9 (2010), pp. 411–424. doi: 10.1007/s10207-010-0121-2
  • J.A.M. Naranjo, N. Antequera, L.G. Casado, and J.A. López Ramos, A suite of algorithms for key distribution and authentication in centralized secure multicast environments, J. Comput. Appl. Math. 236 (2012), pp. 3042–3051. doi: 10.1016/j.cam.2011.02.015
  • W. Tsaur and C. Chou, Efficient algorithms for speeding up the computations of elliptic curve cryptosystems, Appl. Math. Comput. 168 (2005), pp. 1045–1064. doi: 10.1016/j.amc.2004.10.010
  • W. Trappe and Lawrence C. Washington, Introduction to Cryptography with Coding Theory, 2nd ed., Prentice-Hall, Upper Saddle River, NJ, 2006.
  • W.-G. Tzeng and Z.-J. Tzeng, A public-key traitor scheme with revocation using dynamic shares, in 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC, Cheju Island, Korea, 13–15 February, Kwangjo Kim, ed., Springer, Heidelberg, Berlin, 2001, pp. 207–224.
  • S. Zhu and S. Jajodia, Scalable group key management for secure multicast: A taxonomy and new directions, Netw. Secur. 29 (2010), pp. 57–75. doi: 10.1007/978-0-387-73821-5_3

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.