{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:58:56Z","timestamp":1742929136551,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262237"},{"type":"electronic","value":"9783540315421"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11496137_5","type":"book-chapter","created":{"date-parts":[[2010,9,25]],"date-time":"2010-09-25T19:14:24Z","timestamp":1285442064000},"page":"56-74","source":"Crossref","is-referenced-by-count":4,"title":["A Traitor Tracing Scheme Based on RSA for Fast Decryption"],"prefix":"10.1007","author":[{"given":"John Patrick","family":"McGregor","sequence":"first","affiliation":[]},{"given":"Yiqun Lisa","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley and Sons, Inc., New York (2001)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal Asymmetric Encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 92\u2013111. Springer, Heidelberg (1995)"},{"issue":"2","key":"5_CR3","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society\u00a046(2), 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-44647-8_17","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D.: Simplified OAEP for the RSA and Rabin Functions. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 275\u2013291. Springer, Heidelberg (2001)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"D. Boneh","year":"1999","unstructured":"Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 338\u2013353. Springer, Heidelberg (1999)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory\u00a046(3), 893\u2013910 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding","author":"J. Cox","year":"1996","unstructured":"Cox, J., Kilian, J., Leighton, T., Sharmoon, T.: A Secure Robust Watermark for Multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 185\u2013206. Springer, Heidelberg (1996)"},{"key":"5_CR10","unstructured":"Craver, S.A., McGregor, J.P., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D.S., Dean, D., Felten, E.W.: Reading Between the Lines: Lessons from the SDMI Challenge. Princeton Univ. CS Technical Report TR-657-02 (2002)"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1080\/0161-118491859060","volume":"8","author":"J.M. DeLaurentis","year":"1984","unstructured":"DeLaurentis, J.M.: A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. Cryptologia\u00a08(3), 253\u2013259 (1984)","journal-title":"Cryptologia"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/3-540-46766-1_37","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"Y. Desmedt","year":"1992","unstructured":"Desmedt, Y., Frankel, Y.: Shared Generation of Authenticators and Signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 457\u2013469. Springer, Heidelberg (1992)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N., Kiayias, A., Yung, M.: Fully Scalable Public-Key Traitor Tracing. In: Proceedings of Principles of Distributed Computing (PODC-2003) (July 2003)","DOI":"10.1145\/872035.872062"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-48405-1_23","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"A. Fiat","year":"1999","unstructured":"Fiat, A., Tassa, T.: Dynamic Traitor Tracing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 354\u2013371. Springer, Heidelberg (1999)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-44647-8_16","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"E. Fujisaki","year":"2001","unstructured":"Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP Is Secure under the RSA Assumption. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 260\u2013274. Springer, Heidelberg (2001)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Gafni","year":"1999","unstructured":"Gafni, E., Staddon, J., Yin, Y.L.: Efficient Methods for Integrating Traceability and Broadcast Encryption. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 372\u2013387. Springer, Heidelberg (1999)"},{"issue":"1","key":"5_CR18","first-page":"223","volume":"8","author":"J. Kahn","year":"1995","unstructured":"Kahn, J., Komlos, J., Szemeredi, E.: On the Probability that a Random +\/\u22121 Matrix Is Singular. Journal of the AMS\u00a08(1), 223\u2013240 (1995)","journal-title":"Journal of the AMS"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. In: Proceedings of the ACM Workshop on Digital Rights Management (2002)","DOI":"10.1007\/978-3-540-44993-5_3"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-44647-8_4","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"A. Kiayias","year":"2001","unstructured":"Kiayias, A., Yung, M.: Self Protecting Pirates and Black-box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 63\u201379. Springer, Heidelberg (2001)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/3-540-46035-7_30","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Traitor Tracing with a Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 450\u2013465. Springer, Heidelberg (2002)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0054123","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"K. Kurosawa","year":"1998","unstructured":"Kurosawa, K., Desmedt, Y.G.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 145\u2013157. Springer, Heidelberg (1998)"},{"key":"5_CR23","volume-title":"Handbook of Applied Cryptography","author":"J. Menezes","year":"1997","unstructured":"Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1007\/BFb0055750","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Naor","year":"1998","unstructured":"Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 502\u2013517. Springer, Heidelberg (1998)"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 49\u201364. Springer, Heidelberg (1996)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Asymmetric Fingerprinting for Larger Collusions. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 145\u2013157 (1997)","DOI":"10.1145\/266420.266453"},{"issue":"2","key":"5_CR28","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"5_CR29","series-title":"R. Safavi-Naini and Y. Yang","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44598-6_20","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"R. Safavi-Naini","year":"2000","unstructured":"Safavi-Naini, R., Yang, Y.: Sequential Traitor Tracing. In: Bellare, M. (ed.) CRYPTO 2000. R. Safavi-Naini and Y. Yang, vol.\u00a01880, pp. 316\u2013332. Springer, Heidelberg (2000)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group Rekeying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 215\u2013228 (2000)","DOI":"10.1109\/SECPRI.2000.848459"},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-44647-8_15","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"V. Shoup","year":"2001","unstructured":"Shoup, V.: OAEP Reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 239\u2013259. Springer, Heidelberg (2001)"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-45682-1_11","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Silverberg","year":"2001","unstructured":"Silverberg, A., Staddon, J., Walker, J.L.: Efficient Traitor Tracing Algorithms using List Decoding. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 175\u2013192. Springer, Heidelberg (2001)"},{"issue":"2","key":"5_CR33","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/0161-118391857900","volume":"7","author":"G.J. Simmons","year":"1993","unstructured":"Simmons, G.J.: A Weak Privacy Protocol Using the RSA Cryptosystem. Cryptologia\u00a07(2), 180\u2013182 (1993)","journal-title":"Cryptologia"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Stinson, D., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Mathematics\u00a011(1) (1998)","DOI":"10.1137\/S0895480196304246"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48892-8_12","volume-title":"Selected Areas in Cryptography","author":"D.R. Stinson","year":"1999","unstructured":"Stinson, D.R., Wei, R.: Key Preassigned Traceability Schemes for Broadcast Encryption. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 144\u2013156. Springer, Heidelberg (1999)"},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45353-9_29","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"Y. Watanabe","year":"2001","unstructured":"Watanabe, Y., Hanaoka, G., Imai, H.: Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 392\u2013407. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11496137_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T02:17:49Z","timestamp":1740536269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11496137_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262237","9783540315421"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/11496137_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}