{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:07:36Z","timestamp":1779203256973,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_3","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"41-62","source":"Crossref","is-referenced-by-count":568,"title":["Revocation and Tracing Schemes for Stateless Receivers"],"prefix":"10.1007","author":[{"given":"Dalit","family":"Naor","sequence":"first","affiliation":[]},{"given":"Moni","family":"Naor","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Lotspiech","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-48000-6_27","volume-title":"Advances in Cryptology-Asiacrypt\u2019 99","author":"J. Anzai","year":"1999","unstructured":"J. Anzai, N. Matsuzaki and T. Matsumoto, A Quick Group Key Distribution Sceheme with \u201cEntity Revocation\u201d, Advances in Cryptology-Asiacrypt\u2019 99, LNCS 1716, Springer, 1999, pp. 333\u2013347."},{"key":"3_CR2","unstructured":"O. Berkman, M. Parnas and J. Sgall, Efficient Dynamic Traitor Tracing, Proc. of the 11th ACM-SIAM Symp. on Discrete Algorithms (SODA), pp. 586\u2013595, 2000."},{"key":"3_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"D. Boneh","year":"1999","unstructured":"D. Boneh and M. Franklin, An efficient public key traitor tracing scheme, Advances in Cryptology-Crypto\u2019 99, LNCS 1666, Springer, 1999, pp. 338\u2013353."},{"issue":"5","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"D. Boneh, and J. Shaw, Collusion Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, Vol 44, No. 5, pp. 1897\u20131905, 1998.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, Multicast Security: A Taxonomy and Some Efficient Constructions, Proc. of INFOCOM\u2019 99, Vol. 2, pp. 708\u2013716, New York, NY, March 1999.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, T. Malkin, K. Nissim, Efficient Communication-Storage Tradeoffs for Multicast Encryption, Advances in Cryptology-EUROCRYPT\u2019 99, LNCS 1592, Springer, 1999, pp. 459\u2013474."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","first-page":"13","volume-title":"Advances in Cryptology-CRYPTO","author":"R. Cramer","year":"1999","unstructured":"R. Cramer and V. Shoup, A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. Advances in Cryptology-CRYPTO 1999, Lecture Notes in Computer Science 1462, Springer, pp. 13\u201325."},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat and M. Naor, Tracing traitors, Advances in Cryptology-CRYPTO\u2019 94, LNCS 839, Springer, pp. 257\u2013270, 1994."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"B. Chor, A. Fiat, M. Naor and B. Pinkas, Tracing traitors, IEEE Transactions on Information Theory, Vol. 46, No. 3, May 2000.","DOI":"10.1109\/18.841169"},{"key":"3_CR10","unstructured":"Content Protection for Recordable Media. Available: http:\/\/www.4centity.com\/4centity\/tech\/cprm"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"C. Dwork, J. Lotspiech and M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, 28th Symp. on the Theory of Computing, 1996, pp. 489\u2013498.","DOI":"10.1145\/237814.237997"},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor, Broadcast Encryption, Advances in Cryptology-CRYPTO\u2019 93, LNCS 773, Springer, 1994, pp. 480\u2013491."},{"key":"3_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/3-540-48405-1_23","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"A. Fiat","year":"1999","unstructured":"A. Fiat and T. Tassa, Dynamic Traitor Tracing Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666, 1999, pp. 354\u2013371."},{"key":"3_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology-CRYPTO","author":"E. Fujisaki","year":"1999","unstructured":"E. Fujisaki and T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, Advances in Cryptology-CRYPTO 1999, LNCS 1666, 1999, pp. 537\u2013554."},{"key":"3_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"E. Gafni","year":"1999","unstructured":"E. Gafni, J. Staddon and Y. L. Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption, Advances in Cryptology-CRYPTO\u201999, LNCS 1666, Springer, 1999, pp. 372\u2013387."},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-44598-6_21","volume-title":"Advances in Cryptology-CRYPTO\u20192000","author":"J.A. Garay","year":"2000","unstructured":"J.A. Garay, J. Staddon and A. Wool, Long-Lived Broadcast Encryption. Advances in Cryptology-CRYPTO\u20192000, LNCS 1880, pp. 333\u2013352, 2000."},{"issue":"4","key":"3_CR17","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, How to Construct Random Functions. JACM 33(4): 792\u2013807 (1986)","journal-title":"JACM"},{"key":"3_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"R. Kumar","year":"1999","unstructured":"R. Kumar, R. Rajagopalan and A. Sahai, Coding Constructions for blacklisting problems without Copmutational Assumptions. Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666, 1999, pp. 609\u2013623."},{"key":"3_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"M. Luby","year":"1998","unstructured":"M. Luby and J. Staddon, Combinatorial Bounds for Broadcast Encryption. Advances in Cryptology-EUROCRYPT\u2019 98, LNCS vol 1403, 1998, pp. 512\u2013526."},{"key":"3_CR20","unstructured":"D. McGrew, A. T. Sherman, Key Establishment in Large Dynamic Groups Using One-Way Function Trees, submitted to IEEE Transactions on Software Engineering (May 20, 1998)."},{"key":"3_CR21","unstructured":"D. Naor, M. Naor, J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, full version available at the IACR Crypto Archive http:\/\/eprint.iacr.org\/ ."},{"key":"3_CR22","unstructured":"M. Naor, Tradeoffs in Subset-Cover Revocation Schemes, manuscript, 2001."},{"key":"3_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/BFb0055750","volume-title":"Advances in Cryptology-Crypto\u2019 98","author":"M. Naor","year":"1998","unstructured":"M. Naor and B. Pinkas, Threshold traitor tracing, Advances in Cryptology-Crypto\u2019 98, LNCS 1462, pp. 502\u2013517."},{"key":"3_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Efficient Trace and Revoke Schemes Financial Cryptography\u2019 2000","author":"M. Naor","year":"2001","unstructured":"M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes Financial Cryptography\u2019 2000, LNCS, Springer."},{"key":"3_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding Workshop, First International Workshop","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann, Trials of Traced Traitors, Information Hiding Workshop, First International Workshop, Cambridge, UK, LNCS 1174, Springer, 1996, pp. 49\u201364."},{"key":"3_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44598-6_20","volume-title":"Advances in Cryptology-CRYPTO 2000","author":"R. Safavi-Naini","year":"2000","unstructured":"R. Safavi-Naini and Y. Wang, Sequential Traitor Tracing, Advances in Cryptology-CRYPTO 2000, LNCS 1880, pp. 316\u2013332, 2000."},{"key":"3_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0054113","volume-title":"Advances in Cryptology-EUROCRYPT\u201998","author":"V. Shoup","year":"1998","unstructured":"V. Shoup and R. Gennaro, Securing threshold cryptosystems against chosen ciphertext attack, Advances in Cryptology-EUROCRYPT\u201998, LNCS 1403, 1998, pp. 1\u201316."},{"key":"3_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48892-8_12","volume-title":"Proc. Fifth Annual Workshop on Selected Areas in Cryptography","author":"D.R. Stinson","year":"1999","unstructured":"D.R. Stinson and R. Wei, Key Preassigned Traceability Schemes for Broadcast Encryption, Proc. Fifth Annual Workshop on Selected Areas in Cryptography, LNCS 1556 (1999), pp. 144\u2013156."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"D.M. Wallner, E.J. Harder and R.C. Agee, Key Management for Multicast: Issues and Architectures, Internet Request for Comments 2627, June, 1999. Available: ftp:\/\/.ietf.org\/rfc\/rfc2627.txt","DOI":"10.17487\/rfc2627"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"C. K. Wong, M. Gouda and S. Lam, Secure Group Communications Using Key Graphs, Proc. ACM SIGCOMM\u201998, pp. 68\u201379.","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T10:22:20Z","timestamp":1556965340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}