{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:25Z","timestamp":1725484345503},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_36","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"482-496","source":"Crossref","is-referenced-by-count":2,"title":["Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing"],"prefix":"10.1007","author":[{"given":"Hyun-Jeong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"36_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-48000-6_27","volume-title":"Proc. Advances in Cryptology-Asiacrypt\u2019 99","author":"J. Anzai","year":"1999","unstructured":"J. Anzai, N. Matsuzaki and T. Matsumoto, \u201cA Quick Group Key Distribution Scheme with Entity Revocation\u201d, In Proc. Advances in Cryptology-Asiacrypt\u2019 99, Vol. 1716 of Lecture Notes in Computer Science, pp. 333\u2013347, Springer Verlag, 1999."},{"key":"36_CR2","series-title":"Lect Notes Comput Sci","first-page":"92","volume-title":"Eurocypt\u2019 94","author":"M. Bellare","year":"1999","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal Asymmetric Encryption \u2014 How to Encrypt with RSA.\u201d, In Eurocypt\u2019 94, LNCS 950, pages 92\u2013111. Springer Verlag, 1999."},{"key":"36_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Proc. Advances in Cryptology-Crypto\u2019 99","author":"D. Boneh","year":"1999","unstructured":"D. Boneh and M. Franklin, \u201cAn Efficient Public Key Traitor Tracing Scheme\u201d, In Proc. Advances in Cryptology-Crypto\u2019 99, Vol. 1666 of Lecture Notes in Computer Science, pp. 338\u2013353. Springer Verlag, 1999."},{"key":"36_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Proc. the Third Algorithmic Number Theory Symposium","author":"D. Boneh","year":"1998","unstructured":"D. Boneh, \u201cThe Decision Diffie-Hellman Problem\u201d, In Proc. the Third Algorithmic Number Theory Symposium, Vol. 1423 of Lecture Notes in Computer Science, pp. 48\u201363. Springer Verlag, 1998."},{"key":"36_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology-Crypto\u201988","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor. \u201cUntraceable electronic cash\u201d, In Advances in Cryptology-Crypto\u201988, Lecture Notes in Computer Science, pp. 319\u2013327. Springer-Verlag, 1990."},{"key":"36_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Proc. Advances in Cryptology-Crypto\u2019 94","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat and M. Naor, \u201cTracing Traitors\u201d, In Proc. Advances in Cryptology-Crypto\u2019 94, Vol. 839 of Lecture Notes in Computer Science, pp. 257\u2013270, Springer Verlag, 1994."},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"C. Dwork, J. Lotspiech and M. Naor, \u201cDigital Signets: Self-Enforcing Protection of Digital Information\u201d, In 28th Symposium on the Theory of Computation\u2019 96, pp. 489\u2013498, 1996.","DOI":"10.1145\/237814.237997"},{"key":"36_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0054123","volume-title":"Proc. Advances in Cryptology-Eurocrypt\u2019 98","author":"K. Kurosawa","year":"1998","unstructured":"K. Kurosawa and Y. Desmedt, \u201cOptimum Traitor Tracing and Asymmetric Schemes\u201d, In Proc. Advances in Cryptology-Eurocrypt\u2019 98, Vol. 1403 of Lecture Notes in Computer Science, pp. 145\u2013157, Springer Verlag, 1998."},{"key":"36_CR9","unstructured":"A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, \u201cHandbook of Applied Cryptography\u201d, CRC Press, pp. 351\u2013352, 1996."},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, A. Juels and P. Nguyen, \u201cProprietary Certificates\u201d, to appear in Topics in Cryptography CT-RSA 2002, 2002.","DOI":"10.1007\/3-540-45760-7_12"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"M. Naor and B. Pinkas, \u201cEfficient Trace and Revoke Schemes\u201d, In Proc. Financial Cryptography\u2019 00, Anguilla, February 2000.","DOI":"10.1007\/3-540-45472-1_1"},{"key":"36_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-44586-2_8","volume-title":"International Workshop on Practice and Theory in Public-Key Cryptography-PKC\u2019 01","author":"T. Okamoto","year":"2001","unstructured":"T. Okamoto and D. Pointcheval, \u201cThe Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes\u201d, In International Workshop on Practice and Theory in Public-Key Cryptography-PKC\u2019 01, Vol. 1992 of Lecture Notes in Computer Science, pp. 104\u2013118, Springer Verlag, 2001."},{"key":"36_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"The Cryptographers\u2019 Track of the RSA Conference\u2019 2001","author":"T. Okamoto","year":"2001","unstructured":"T. Okamoto and D. Pointcheval, \u201cREACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform\u201d, In The Cryptographers\u2019 Track of the RSA Conference\u2019 2001, Vol. 2020 of Lecture Notes in Computer Science, pp. 159\u2013175, Springer Verlag, 2001."},{"key":"36_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Proc. Workshop in Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"B. Pfitzmann, \u201cTrials of Traced Traitors\u201d, In Proc. Workshop in Information Hiding, Vol. 1174 of Lecture Notes in Computer Science, pp. 49\u201364, Springer Verlag, 1996."},{"issue":"11","key":"36_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to Share a Secret\u201d, In Comm. ACM, Vol. 22, No. 11, pp. 612\u2013613, 1979.","journal-title":"Comm. ACM"},{"key":"36_CR16","unstructured":"D. R. Stinson, \u201cCryptography Theory and Practice\u201d, CRC Press, pp. 330\u2013331, 1995."},{"key":"36_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-44586-2_16","volume-title":"International Workshop on Practice and Theory in Public-Key Cryptography-PKC\u2019 01","author":"W. Tzeng","year":"2001","unstructured":"W. Tzeng and Z. J. Tzeng, \u201cA Public-Key Traitor Tracing Scheme with Revocation using Dynamic Shares\u201d, In International Workshop on Practice and Theory in Public-Key Cryptography-PKC\u2019 01, Vol. 1992 of Lecture Notes in Computer Science, pp. 207\u2013224, Springer Verlag, 2001."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:39:13Z","timestamp":1556415553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}