{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T04:57:07Z","timestamp":1778561827064,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"},{"value":"9783540486589","type":"electronic"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-48658-5_25","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:39Z","timestamp":1186678239000},"page":"257-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":360,"title":["Tracing Traitors"],"prefix":"10.1007","author":[{"given":"Benny","family":"Chor","sequence":"first","affiliation":[]},{"given":"Amos","family":"Fiat","sequence":"additional","affiliation":[]},{"given":"Moni","family":"Naor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/18.119713","volume":"38","author":"N. Alon","year":"1992","unstructured":"N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, vol. 38 (1992), pp. 509\u2013516.","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR2","unstructured":"N. Alon and J. Spencer, The Probabilistic Method, Wiley, 1992."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter and M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences 18 (1979), pp. 143\u2013154.","journal-title":"Journal of Computer and System Sciences"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erd\u00f6s","year":"1985","unstructured":"P. Erd\u00f6s, P. Frankl, Z. F\u00fcredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51, 1985, pp. 79\u201389.","journal-title":"Israel J. of math."},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1145\/828.1884","volume":"31","author":"M. L. Fredman","year":"1984","unstructured":"M. L. Fredman, J. Koml\u00f3s and E. Szemer\u00e9di, Storing a Sparse Table with O (1) Worst Case Access Time, Journal of the ACM, Vol 31, 1984, pp. 538\u2013544.","journal-title":"Journal of the ACM"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"A. Fiat and N. Naor, Broadcast Encryption, Proc. Advances in Cryptology \u2014 Crypto\u2019 93, 1994, pp. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"25_CR7","volume-title":"Data Structures and Algorithms: Sorting and Searching","author":"K. Mehlhorn","year":"1984","unstructured":"K. Mehlhorn, Data Structures and Algorithms: Sorting and Searching, Springer-Verlag, Berlin Heidelberg, 1984."},{"key":"25_CR8","volume-title":"The theory of error correcting codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, North Holland, Amsterdam, 1977."},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22, pp. 265\u2013279 (1981).","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:06:31Z","timestamp":1558260391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540583332","9783540486589"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"13 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}