{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:22:58Z","timestamp":1751923378610},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404101"},{"type":"electronic","value":"9783540449935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_3","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:21:24Z","timestamp":1277234484000},"page":"32-50","source":"Crossref","is-referenced-by-count":22,"title":["Breaking and Repairing Asymmetric Public-Key Traitor Tracing"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Canal Plus files $ 1 billion lawsuit on News Corp arm, Reuters, 03.12.02, 7:46 PM ET, Also http:\/\/www.wired.com\/news\/politics\/0,1283,51005,00.html"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"On the (Im)possibility of Obfuscating Programs","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 1. Springer, Heidelberg (2001)"},{"key":"3_CR3","unstructured":"Berlekamp, E.R., Welch, L.: Error Correction of Algebraic Block Codes. U.S. Patent, Number 4,633,470 (1986)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"D. Boneh","year":"1999","unstructured":"Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 338. Springer, Heidelberg (1999)"},{"key":"3_CR5","unstructured":"Boneh, D., Franklin, M.: An Efficient Public Key Traitor Tracing Scheme (2001) (manuscript, full-version of [4])"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates \u2013 Building in Privacy, Ph.D. thesis, Technical University of Eindhoven (1999)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45682-1_22","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"Y.-C. Chang","year":"2001","unstructured":"Chang, Y.-C., Lu, C.-J.: Oblivious Polynomial Evaluation and Oblivious Neural Learning. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 369. Springer, Heidelberg (2001)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"issue":"3","key":"3_CR9","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B. Chor","year":"2000","unstructured":"Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory\u00a046(3), 893\u2013910 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, p. 13. Springer, Heidelberg (1998)"},{"key":"3_CR11","volume-title":"The design of Rijndael-AES the advanced encryption standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael-AES the advanced encryption standard. Springer, Heidelberg (2002)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Gafni","year":"1999","unstructured":"Gafni, E., Staddon, J., Yin, Y.L.: Efficient methods for integrating traceability and broadcast encryption. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 372. Springer, Heidelberg (1999)"},{"key":"3_CR14","first-page":"28","volume-title":"The Proceedings of the 39th Annual Symposium on Foundations of Computer Science","author":"V. Guruswami","year":"1998","unstructured":"Guruswami, V., Sudan, M.: Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In: The Proceedings of the 39th Annual Symposium on Foundations of Computer Science, pp. 28\u201339. IEEE Computer Society, Los Alamitos (1998)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-44647-8_4","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"A. Kiayias","year":"2001","unstructured":"Kiayias, A., Yung, M.: Self Protecting Pirates and Black-Box Traitor Tracing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 63. Springer, Heidelberg (2001)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/3-540-46035-7_30","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, p. 450. Springer, Heidelberg (2002)"},{"key":"3_CR17","unstructured":"Kiayias, A., Yung, M.: Robust Malleable Oblivious Polynomial Evaluation (manuscript)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-45465-9_21","volume-title":"Automata, Languages and Programming","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol.\u00a02380, p. 232. Springer, Heidelberg (2002)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Komaki, H., Watanabe, Y., Hanaoka, G., Imai, H.: Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. In: Public Key Cryptography (2001)","DOI":"10.1007\/3-540-44586-2_17"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0054123","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"K. Kurosawa","year":"1998","unstructured":"Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 145\u2013157. Springer, Heidelberg (1998)"},{"key":"3_CR21","volume-title":"The Theory of Error Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.: The Theory of Error Correcting Codes. North Holland, Amsterdam (1977)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.B.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 41. Springer, Heidelberg (2001)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Oblivious Transfer and Polynomial Evaluation. In: The Proceedings of the 31th ACM Symposium on the Theory of Computing (1999) (Full version available from authors)","DOI":"10.1145\/301250.301312"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45472-1_1","volume-title":"Financial Cryptography","author":"M. Naor","year":"2001","unstructured":"Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, p. 1. Springer, Heidelberg (2001)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-61996-8_31","volume-title":"Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 49\u201363. Springer, Heidelberg (1996)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Asymmetric fingerprinting for larger collusions. In: Proc. ACM Conference on Computer and Communication Security, pp. 151\u2013160 (1997)","DOI":"10.1145\/266420.266453"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.F.: On Software Protection via Function Hiding. Information Hiding (1998)","DOI":"10.1007\/3-540-49380-8_9"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48892-8_12","volume-title":"Selected Areas in Cryptography","author":"D. Stinson","year":"1999","unstructured":"Stinson, D., Wei, R.: Key preassigned traceability schemes for broadcast encryption. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 144\u2013156. Springer, Heidelberg (1999)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Stinson, D.R., Wei, R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM J. on Discrete Math.\u00a011(1) (1998)","DOI":"10.1137\/S0895480196304246"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Watanabe, Y., Hanaoka, G., Imai, H.: Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. In: CT-RSA 2001 (2001)","DOI":"10.1007\/3-540-45353-9_29"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:38:38Z","timestamp":1559209118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}