{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:58:41Z","timestamp":1742925521409,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242724"},{"type":"electronic","value":"9783642242731"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24273-1_31","type":"book-chapter","created":{"date-parts":[[2011,9,27]],"date-time":"2011-09-27T18:27:24Z","timestamp":1317148044000},"page":"233-237","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Traitors Tracing Scheme against Convex Combination Attack"],"prefix":"10.1007","author":[{"given":"Ya-Li","family":"Qi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/3-540-44586-2_17","volume-title":"Public Key Cryptography","author":"H. Komaki","year":"2001","unstructured":"Komaki, H., Watanabe, Y., Hanaoka, G., Imai, H.: Efficient asymmetric self-enforcement scheme with public traceability. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 225\u2013239. Springer, Heidelberg (2001)"},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discret elogarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/3-540-45450-0_36","volume-title":"Information Security and Privacy","author":"H.-J. Kim","year":"2002","unstructured":"Kim, H.-J., Lee, D.-H., Yung, M.: Privacy against piracy: Protecting two-level revocable P-K traitor tracing. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 482\u2013496. Springer, Heidelberg (2002)"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-44586-2_16","volume-title":"Public Key Cryptography","author":"W.G. Tzeng","year":"2001","unstructured":"Tzeng, W.G., Tzeng, Z.J.: A public-Key traitor tracing scheme with revocation using dynamic shares. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 207\u2013224. Springer, Heidelberg (2001)"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/3-540-48405-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"D. Boneh","year":"1999","unstructured":"Boneh, D., Franklin, M.K.: An efficient public key traitor scheme (Extended abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 338\u2013353. Springer, Heidelberg (1999)"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-44993-5_3","volume-title":"Digital Rights Management","author":"A. Kiayias","year":"2003","unstructured":"Kiayias, A., Yung, M.: Breaking and repairing asymmetric public-key traitor tracing. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 32\u201350. Springer, Heidelberg (2003)"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0054123","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"K. Kurosawa","year":"1998","unstructured":"Kurosawa, K., Desmedt, Y.G.: Optimum traitor tracing and asymmetric schemes. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 145\u2013157. Springer, Heidelberg (1998)"},{"key":"31_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45472-1_1","volume-title":"Financial Cryptography","author":"M. Naor","year":"2001","unstructured":"Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 1\u201320. Springer, Heidelberg (2001)"},{"issue":"2","key":"31_CR10","first-page":"182","volume":"5","author":"B. Yang","year":"2007","unstructured":"Yang, B., Ma, H., Zhu, S.: A Traitor Tracing Scheme Based on the RSA System. International Journal of Network Security\u00a05(2), 182\u2013186 (2007)","journal-title":"International Journal of Network Security"},{"issue":"8","key":"31_CR11","first-page":"1102","volume":"31","author":"X.f. Li","year":"2010","unstructured":"Li, X.f., Zhao, H., Wang, J.l., et al.: Improving ElGamal Digital Signature Algorithm by Adding a Random Number. Journal of Nort heastern U niversity(Natural Science)\u00a031(8), 1102\u20131105 (2010)","journal-title":"Journal of Nort heastern U niversity(Natural Science)"}],"container-title":["Communications in Computer and Information Science","Emerging Research in Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24273-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T22:36:10Z","timestamp":1554676570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24273-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242724","9783642242731"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24273-1_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}