98 4.5.1 An Efficient Selectively CCA-Secure Broadcast Encryption, p.100 ,
Advanced Access Content System (AACS) -introduction and common cryptographic elements book, p.103, 2009. ,
Wildcarded Identity-Based Encryption, Journal of Cryptology, vol.1, issue.2, pp.42-82, 2011. ,
DOI : 10.1007/s00145-010-9060-3
URL : https://hal.archives-ouvertes.fr/hal-00915848
Robust Encryption, LNCS, vol.28, issue.2, pp.480-497, 2010. ,
DOI : 10.1007/978-3-540-46588-1_28
URL : https://hal.archives-ouvertes.fr/hal-00915836
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, LNCS, vol.2020, issue.101, pp.143-158, 2001. ,
DOI : 10.1007/3-540-45353-9_12
Identity-Based Encryption Gone Wild, LNCS, vol.4052304, issue.25, pp.300-311, 2006. ,
DOI : 10.1007/11787006_26
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys, Africacrypt, pp.351-368, 2010. ,
DOI : 10.1007/978-3-642-12678-9_21
URL : https://hal.archives-ouvertes.fr/inria-00539541
Perfect nizk with adaptive soundness Forward-secure and searchable broadcast encryption with short ciphertexts and private keys, AFI06] Nuttapong Attrapadung Asiacrypt, pp.118-136, 2006. ,
Password-based authenticated key exchange in the three-party setting, PKC 2005, pp.65-84, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00918401
Attribute-based encryption schemes with constant-size ciphertexts, AI09] Nuttapong Attrapadung and Hideki Imai, pp.15-38, 2005. ,
DOI : 10.1016/j.tcs.2011.12.004
URL : https://hal.archives-ouvertes.fr/hal-00763158
A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead, ACISP 2005, pp.89-100, 2005. ,
DOI : 10.1007/11506157_8
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation A preliminary version appeared at PKC 2010, J. Mathematical Cryptology, vol.5, issue.70, pp.115-158, 2012. ,
Breaking rsa generically is equivalent to factoring, Eurocrypt, pp.36-53, 2009. ,
A Revocation Scheme with Minimal Storage at Receivers, LNCS, vol.2501, pp.433-450, 2002. ,
DOI : 10.1007/3-540-36178-2_27
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes, Information Security Applications, pp.401-412, 2003. ,
DOI : 10.1007/978-3-540-24591-9_24
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme, Information Security and Privacy, pp.12-23, 2004. ,
DOI : 10.1007/978-3-540-27800-9_2
Cryptographic solution to a problem of access control in a hierarchy, ACM Trans. Comp. Sys, vol.1, issue.3, pp.239-248, 1983. ,
An algorithm for the organization of information, Proc. USSR Academy of Sciences, pp.263-266, 1962. ,
Short signatures without random oracles Full version at http://eprint.iacr. org Hierarchical identity based encryption with constant size ciphertext, LNCS LNCS, vol.3027171, issue.38, pp.56-73, 2004. ,
DOI : 10.1007/978-3-540-24676-3_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5374
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, LNCS, vol.1807, pp.259-274, 2000. ,
DOI : 10.1007/3-540-45539-6_18
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption, Financial Cryptography and Data Security, pp.52-64, 2006. ,
DOI : 10.1007/11889663_4
A modular approach to the design and analysis of authentication and key exchange protocols, STOC 1998, pp.419-428, 1998. ,
A secure and efficient conference key distribution system, Eurocrypt '94, pp.275-286, 1995. ,
DOI : 10.1007/BFb0053443
Efficient and secure conference-key distribution, Security Protocols, pp.119-129, 1997. ,
DOI : 10.1007/3-540-62494-5_12
A secure and scalable Group Key Exchange system, Information Processing Letters, vol.94, issue.3, pp.137-143, 2005. ,
DOI : 10.1016/j.ipl.2005.01.003
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Relations among notions of security for public-key encryption schemes, Crypto '98, pp.26-45, 1998. ,
DOI : 10.1007/BFb0055718
How To Broadcast A Secret, Eurocrypt '91, pp.535-541, 1991. ,
DOI : 10.1007/3-540-46416-6_50
An Efficient Public Key Traitor Tracing Scheme, Crypto' 99, pp.338-353, 1999. ,
DOI : 10.1007/3-540-48405-1_22
Identity based encryption from the weil pairing, LNCS, vol.2139, pp.213-229090, 2001. ,
A Traceable Block Cipher, LNCS, vol.2894, issue.14, pp.331-346, 2003. ,
DOI : 10.1007/978-3-540-40061-5_21
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, LNCS, vol.3621, issue.87, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.5787
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, CT-RSA 2005, pp.87-103, 2005. ,
DOI : 10.1007/978-3-540-30574-3_8
The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000. ,
DOI : 10.1006/jcss.1999.1694
Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.320-329, 2005. ,
DOI : 10.1145/1102120.1102162
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3538
Traitor tracing with constant size ciphertext, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.455-470, 2008. ,
DOI : 10.1145/1455770.1455834
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.8784
Broadcast encryption: Recent progress and open problem, 2013. slides from a lecture at Bar Ilan Winter School, 2013. ,
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols, LNCS, vol.3152, pp.273-289, 2004. ,
DOI : 10.1007/978-3-540-28628-8_17
Efficient traitor tracing from collusion secure codes Traitors collaborating in public: Pirates 2.0, LNCS LNCS, vol.5155, issue.5479, pp.171-182, 2008. ,
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Optimal asymmetric encryption, Eurocrypt '94, pp.92-111, 1994. ,
DOI : 10.1007/BFb0053428
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1562
The Security of Triple Encryption and a Framework??for??Code-Based??Game-Playing??Proofs, Cryptology ePrint Archive Report, vol.331, p.39, 2004. ,
DOI : 10.1007/11761679_25
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
DOI : 10.1109/18.705568
Applications of multilinear forms to cryptography Fully collusion resistant traitor tracing with short ciphertexts and private keys Functional encryption: Definitions and challenges, Contemporary Mathematics LNCS LNCS, vol.324543, issue.6597, pp.71-90, 2002. ,
Improved versions of Tardos' fingerprinting scheme. Designs, Codes and Cryptography, pp.79-103, 2008. ,
A fully collusion resistant broadcast, trace, and revoke system, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.211-220, 2006. ,
DOI : 10.1145/1180405.1180432
Conjunctive, Subset, and Range Queries on Encrypted Data ,
DOI : 10.1007/978-3-540-70936-7_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5164
The twistaugmented technique for key exchange, LNCS, vol.3958, pp.410-426061, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00103433
Tracing traitors, Crypto '94, pp.257-270, 1994. ,
DOI : 10.1007/3-540-48658-5_25
Tracing traitors, IEEE Transactions on Information Theory, vol.46, issue.3, pp.893-910557, 2000. ,
DOI : 10.1109/18.841169
Multicast security: a taxonomy and some efficient constructions, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.708-716, 1999. ,
DOI : 10.1109/INFCOM.1999.751457
Identification de copies de documents multimédia grâce aux codes de Tardos Chosen-ciphertext security from identitybased encryption, LNCS, vol.3027, pp.57-207, 2004. ,
Practical multilinear maps over the integers Full version at http://eprint. iacr.org/2013/183. 68 [CMN99] Ran Canetti, Tal Malkin, and Kobbi Nissim. Efficient communication-storage tradeoffs for multicast encryption Public traceability in traitor tracing schemes, Crypto 2013 Eurocrypt '99, pp.459-474, 1999. ,
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Crypto '98, pp.13-25, 1998. ,
DOI : 10.1007/BFb0055717
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003. ,
DOI : 10.1137/S0097539702403773
Flexible access control with master keys, LNCS, vol.435, issue.89, pp.316-322, 1990. ,
IANA guidelines for IPv4 multicast address assignments. RFC 5771 (Best Current Practice), p.23, 2010. ,
Towards practical public key systems secure against chosen ciphertext attacks Non-malleable cryptography A preliminary version appeared at STOC' 91, Crypto '91, pp.445-456391, 1992. ,
Fighting pirates 2.0, ACNS 2011, pp.359-376, 2011. ,
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, LNCS, vol.4833, issue.88, pp.200-215, 2007. ,
DOI : 10.1007/978-3-540-76900-2_12
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model, Asiacrypt, pp.100-109, 2002. ,
DOI : 10.1007/3-540-36178-2_6
The hardness of the dhk problem in the generic group model, Cryptology ePrint Archive Report, vol.156, 2006. ,
Public Key Broadcast Encryption for Stateless Receivers, LNCS, vol.2696, issue.66, pp.61-80, 2003. ,
DOI : 10.1007/978-3-540-44993-5_5
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, LNCS, vol.2567, issue.88, pp.100-115095, 2003. ,
DOI : 10.1007/3-540-36288-6_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.9125
New directions in cryptography, Financial Cryptography and Data Security, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Digital signets ? self-enforcing protection of digital content, STOC 1996, pp.489-498, 1996. ,
On the joint security of encryption and signature in EMV A CCA secure hybrid damgård's elgamal encryption, CT-RSA 2012 ProvSec, pp.116-135, 2008. ,
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys) revision 1.0, ECR12] ECRYPT II yearly report on algorithms and keysizes, pp.39-59, 2007. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, pp.469-472, 1985. ,
DOI : 10.1109/TIT.1985.1057074
Broadcast encryption Traitor tracing with optimal transmission rate, ISC, pp.480-491, 1994. ,
How to Enhance the Security of Public-Key Encryption at Minimum Cost, PKC '99, pp.53-68, 1999. ,
DOI : 10.1007/3-540-49162-7_5
RSA-OAEP Is Secure under the RSA Assumption, PKC 2012, pp.81-104, 2004. ,
DOI : 10.1007/s00145-002-0204-y
How to prove yourself: Practical solutions to identification and signature problems A taxonomy of pairing-friendly elliptic curves, Crypto '86, pp.186-194, 1987. ,
Dynamic traitor tracing, LNCS, vol.1666, issue.28, p.83, 1999. ,
DOI : 10.1007/3-540-48405-1_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.206
Candidate Multilinear Maps from Ideal Lattices, Eurocrypt 2013, pp.1-17610, 2012. ,
DOI : 10.1007/978-3-642-38348-9_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6312
Foundations of Cryptography Volume 1 -Basic Tools, p.43, 2001. ,
Foundations of Cryptography -Volume 2 Basic Applications, p.44, 2004. ,
Pairings for cryptographers. Cryptology ePrint Archive, Report, vol.165, p.41, 2006. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
RSA Accumulator Based Broadcast Encryption, Information Security Conference ? ISC 2004, pp.73-86, 2004. ,
DOI : 10.1007/978-3-540-30144-8_7
Efficient tree-based revocation in groups of low-state devices, LNCS, vol.3152, pp.511-527, 2004. ,
Efficient Methods for Integrating Traceability and Broadcast Encryption, CRYPTO' 99, pp.372-387, 1999. ,
DOI : 10.1007/3-540-48405-1_24
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), LNCS, vol.5479268, issue.97, pp.171-188, 2008. ,
DOI : 10.1007/978-3-540-30598-9_15
Secure Hybrid Encryption from Weakened Key Encapsulation, LNCS, vol.4622288, pp.553-571, 2007. ,
DOI : 10.1007/978-3-540-74143-5_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.4329
Obfuscation for Cryptographic Purposes, Journal of Cryptology, vol.28, issue.2, pp.121-168, 2010. ,
DOI : 10.1007/s00145-009-9046-1
The LSD Broadcast Encryption Scheme, LNCS, vol.2442, issue.63, pp.145-161, 2002. ,
DOI : 10.1007/3-540-45708-9_4
On the existence of 3-round zero-knowledge protocols ,
DOI : 10.1007/BFb0055744
Hidden-Vector Encryption with Groups of Prime Order, LNCS, vol.5209, issue.13, pp.75-88, 2008. ,
DOI : 10.1007/978-3-540-85538-5_5
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack, ESORICS, pp.563-577, 2007. ,
DOI : 10.1007/978-3-540-74835-9_37
Traitor tracing for prerecorded and recordable media, Proceedings of the 4th ACM workshop on Digital rights management , DRM '04, pp.83-90, 2004. ,
DOI : 10.1145/1029146.1029160
On the Analysis of Cryptographic Assumptions in the Generic Ring Model, Journal of Cryptology, vol.27, issue.4, pp.225-245, 2009. ,
DOI : 10.1007/s00145-012-9120-y
Factorization of a 768-bit rsa modulus. Cryptology ePrint Archive Optimum traitor tracing and asymmetric schemes Coalition resistant anonymous broadcast encryption scheme based on PUF, Eurocrypt '98, volume 1403 of LNCS Trust and Trustworthy Computing Przemys?aw Kubiak, and Miros?aw Kuty?owski. A revocation scheme preserving privacy. In Information Security and Cryptology, pp.145-157, 1998. ,
URL : https://hal.archives-ouvertes.fr/inria-00444693
General anonymous key broadcasting via Lagrangian interpolation, IET Information Security, pp.79-84, 2008. ,
DOI : 10.1049/iet-ifs:20070122
Introduction to Modern Cryptography, p.47, 2008. ,
Pirate Evolution: How to Make the Most of Your Traitor Keys, LNCS, vol.4622, issue.14, pp.448-465, 2007. ,
DOI : 10.1007/978-3-540-74143-5_25
Tracing and Revoking Pirate Rebroadcasts, ACNS 2009, pp.253-271, 2009. ,
DOI : 10.1007/978-3-642-01957-9_16
Encryption for Digital Content, volume 52 of Advances in Information Security, p.56, 2010. ,
Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004. ,
DOI : 10.1145/984334.984337
A Group Key Distribution Scheme with Decentralised User Join, SCN 2003, pp.146-163, 2003. ,
DOI : 10.1007/3-540-36413-7_11
Predicate encryption supporting disjunctions , polynomial equations, and inner products, LNCS, vol.4965, pp.146-162, 2008. ,
DOI : 10.1007/978-3-540-78967-3_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.8500
Breaking and Repairing Asymmetric Public-Key Traitor Tracing, DRM 2002, p.80, 2002. ,
DOI : 10.1007/978-3-540-44993-5_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.1973
On Crafty Pirates and Foxy Tracers, Security and Privacy in Digital Rights Management ? ACM CCS-8 Workshop DRM 2001, pp.22-39, 2002. ,
DOI : 10.1007/3-540-47870-1_3
Traitor Tracing with Constant Transmission Rate, Eurocrypt, pp.450-465, 2002. ,
DOI : 10.1007/3-540-46035-7_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5994
Scalable Protocols for Authenticated Group Key Exchange, Journal of Cryptology, vol.20, issue.1, pp.85-113, 2007. ,
DOI : 10.1007/s00145-006-0361-5
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions, Journal of Cryptology, vol.19, issue.3, pp.359-377, 2003. ,
DOI : 10.1007/s00145-005-0345-x
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, PKC 2012, pp.206-224 ,
DOI : 10.1007/978-3-642-30057-8_13
Combinatorial bounds for broadcast encryption, Eurocrypt '98, pp.512-526, 1998. ,
DOI : 10.1007/BFb0054150
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.2711
Attribute-Based Broadcast Encryption Scheme Made Efficient, LNCS, vol.5023, pp.325-342, 2008. ,
DOI : 10.1007/978-3-540-68164-9_22
URL : https://hal.archives-ouvertes.fr/hal-00378805
Revocation systems with very small private keys Full Version at http: //eprint.iacr.org [Man09] Mark Manulis. Group key exchange enabling on-demand derivation of peer-to-peer keys, IEEE Symposium on Security and Privacy 2010 ACNS 2009, pp.75-76, 2008. ,
DOI : 10.1109/sp.2010.23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.2462
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring, LNCS, vol.3152, pp.213-219, 2004. ,
DOI : 10.1007/978-3-540-28628-8_13
Broadcasting internet datagrams, RFC, vol.919, issue.11, p.23, 1984. ,
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case, LNCS, vol.2442, pp.111-126, 2002. ,
Secure, efficient and practical key management scheme in the complete-subtree method Revocation and tracing schemes for stateless receivers, IEICE Trans. Fundamentals LNCS, vol.60, issue.114, pp.88-189, 2001. ,
Efficient trace and revoke schemes, LNCS, pp.1-20, 1962. ,
DOI : 10.1007/s10207-010-0121-2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.2021
How to Copyright a Function?, PKC '99, pp.188-196, 1999. ,
DOI : 10.1007/3-540-49162-7_14
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure, ICITS, pp.194-212, 2010. ,
DOI : 10.1007/978-3-642-14496-7_16
Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing , STOC '90, p.49, 1990. ,
DOI : 10.1145/100216.100273
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, LNCS, vol.5037, pp.111-129, 2008. ,
DOI : 10.1007/978-3-540-68914-0_7
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform, CT-RSA 2001, pp.159-174, 2001. ,
DOI : 10.1007/3-540-45353-9_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.5590
Achieving short ciphertexts or short secretkeys for adaptively secure general inner-product encryption, CANS 2011, pp.138-159, 2011. ,
On the security notions for public-key encryption schemes, LNCS, vol.3352, pp.33-46, 2004. ,
Security notions for broadcast encryption full version available from the author's webpage, ACNS 2011, pp.377-394, 2011. ,
Decentralized dynamic broadcast encryption, SCN 2012, pp.166-183, 2012. ,
Message-based traitor tracing with optimal ciphertext rate, Latincrypt 2012, 2012. full version available from the author's webpage ,
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts, Information Security and Privacy, pp.308-321, 2012. ,
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts, Int. J. Inf. Sec, vol.12, p.18, 2013. ,
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000. ,
DOI : 10.1007/s001450010003
Generic construction of hybrid public key traitor tracing with full-public-traceability, LNCS, vol.4052, pp.264-275, 2006. ,
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), pp.543-553, 1999. ,
DOI : 10.1109/SFFCS.1999.814628
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.4689
Identity-based broadcast encryption. Cryptology ePrint Archive, Report, vol.217, p.70, 2007. ,
Identity-Based Cryptosystems and Signature Schemes, LNCS, vol.84, issue.196, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
Lower Bounds for Discrete Logarithms and Related Problems, Eurocrypt '97, pp.256-266, 1997. ,
DOI : 10.1007/3-540-69053-0_18
Sequences of games: a tool for taming complexity in security proofs, LNCS OAEP reconsidered. J. Crypto Cryptology ePrint Archive Report, vol.1807332, issue.49, pp.275-288223, 2000. ,
Traitor tracing scheme with constant ciphertext rate against powerful pirates, Proc. of Workshop on Coding and Cryptography, pp.379-388, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00380143
Sequential traitor tracing, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1319-1326, 2000. ,
DOI : 10.1109/TIT.2003.810629
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.870
Traitor Tracing for Shortened and Corrupted Fingerprints, DRM 2003, pp.81-100, 2003. ,
DOI : 10.1007/978-3-540-44993-5_6
Publicly Verifiable Secret Sharing, Eurocrypt '96, pp.190-199, 1996. ,
DOI : 10.1007/3-540-68339-9_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.153
Fuzzy Identity-Based Encryption, LNCS, vol.3494, issue.24, pp.457-473086, 2004. ,
DOI : 10.1007/11426639_27
Optimal probabilistic fingerprint codes A preliminary version appeared in STOC '03, J. ACM, vol.55, issue.2, p.57, 2008. ,
Low Bandwidth Dynamic Traitor Tracing Schemes, PKC 2001, pp.167-183, 1992. ,
DOI : 10.1007/s00145-004-0214-z
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.7622
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, PKC 2011, pp.53-70, 2008. ,
DOI : 10.1007/978-3-642-19379-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719
Secure group communications using key graphs, A preliminary version appeared at ACM SIGCOMM '98, pp.16-30, 2000. ,
DOI : 10.1109/90.836475
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.1470
Key management for multicast: Issues and architectures, RFC, vol.2627, issue.24, p.61, 1999. ,
DOI : 10.17487/rfc2627
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings, SAC 2007, pp.264-277, 2007. ,
DOI : 10.1007/978-3-540-77360-3_17
Asymmetric Group Key Agreement, LNCS, vol.17, issue.2, pp.153-170, 2009. ,
DOI : 10.1007/3-540-44448-3_47
Storage-Efficient Stateless Group Key Revocation, ISC 2004, pp.25-38, 2004. ,
DOI : 10.1007/978-3-540-30144-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.574.5563
Bridging Broadcast Encryption and Group Key Agreement, LNCS, vol.7073, issue.27, pp.143-160, 2011. ,
DOI : 10.1007/978-3-642-25385-0_8
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, p.88, 2004. ,
DOI : 10.1145/1030083.1030130
Efficient broadcast encryption using multiple interpolation methods, Information Security and Cryptology ? ICISC 2004, pp.87-103, 2004. ,