{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:10:02Z","timestamp":1745943002590,"version":"3.40.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T00:00:00Z","timestamp":1357257600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s10207-012-0186-1","type":"journal-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T14:38:34Z","timestamp":1357223914000},"page":"1-17","source":"Crossref","is-referenced-by-count":2,"title":["Toward tracing and revoking schemes secure against collusion and any form of secret information leakage"],"prefix":"10.1007","volume":"12","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]},{"given":"Angel","family":"Perez del Pozo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abdalla, M., Catalano, D., Dent, A., Malone-Lee, J., Neven, G., Smart, N.: Identity-based encryption gone wild. In: Automata, Languages and Programming, vol. 4052 of LNCS, pp. 300\u2013311. Springer (2006)","key":"186_CR1","DOI":"10.1007\/11787006_26"},{"doi-asserted-by":"crossref","unstructured":"Anzai, J., Matsuzaki, N., Matsumoto, T.: A quick group key distribution scheme with entity revocation. In: Advances in Cryptology\u2013Asiacrypt \u201999. Lecture Notes in Computer Science, vol. 1716, pp. 333\u2013347 (1999)","key":"186_CR2","DOI":"10.1007\/978-3-540-48000-6_27"},{"doi-asserted-by":"crossref","unstructured":"Berkovits, S.: How to broadcast a secret. In: Advances in Cryptology\u2013EUROCRYPT \u201991, vol. 547 of LNCS, pp. 535\u2013541. Springer (1991)","key":"186_CR3","DOI":"10.1007\/3-540-46416-6_50"},{"doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO, vol. 3621 of LNCS, pp. 258\u2013275. Springer (2005)","key":"186_CR4","DOI":"10.1007\/11535218_16"},{"doi-asserted-by":"crossref","unstructured":"Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: CCS \u201908: Proceedings of the 15th ACM conference on Computer and communications security, pp. 501\u2013510, ACM, New York (2008)","key":"186_CR5","DOI":"10.1145\/1455770.1455834"},{"doi-asserted-by":"crossref","unstructured":"Boneh, D.: The decision diffie-hellman problem. In: Proceedings of the Third Algorithmic Number Theory Symposium, vol. 1423 of LNCS, pp. 48\u201363. Springer (1998)","key":"186_CR6","DOI":"10.1007\/BFb0054851"},{"doi-asserted-by":"crossref","unstructured":"Billet, O., Phan, D.H.: Efficient traitor tracing from collusion secure codes. In: ICITS \u201908: Proceedings of the 3rd International Conference on Information Theoretic Security, pp. 171\u2013182, Springer, Berlin (2008)","key":"186_CR7","DOI":"10.1007\/978-3-540-85093-9_17"},{"unstructured":"Billet, O., Phan, D.H.: Traitors collaborating in public: Pirates 2.0. In: Advances in Cryptology\u2013Eurocrypt \u201909, vol. 5479 of LNCS, pp. 189\u2013205, (2009)","key":"186_CR8"},{"unstructured":"Berkman, O., Parnas, M., Sgall, J.: Efficient dynamic traitor tracing. In: SODA \u201900: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 586\u2013595, Society for Industrial and Applied Mathematics, Philadelphia (2000)","key":"186_CR9"},{"doi-asserted-by":"crossref","unstructured":"Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of IEEE INFOCOMM 1999, vol. 2, pp. 689\u2013698 (1999)","key":"186_CR10","DOI":"10.1109\/INFCOM.1999.751455"},{"doi-asserted-by":"crossref","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: CRYPTO \u201994: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, pp. 257\u2013270, Springer, London (1994)","key":"186_CR11","DOI":"10.1007\/3-540-48658-5_25"},{"issue":"3","key":"186_CR12","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B Chor","year":"2000","unstructured":"Chor, B., Fiat, A., Naor, M., Pinkas, B.: Traitor tracing. IEEE Trans. Inf. Theory 46(3), 893\u2013910 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proceedings of INFOCOMM 1999, pp. 708\u2013716 (1999)","key":"186_CR13","DOI":"10.1109\/INFCOM.1999.751457"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Advances in Cryptology\u2013EUROCRYPT \u201999, vol. 1592 of LNCS, pp. 459\u2013474. Springer (1999)","key":"186_CR14","DOI":"10.1007\/3-540-48910-X_32"},{"doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: Digital Rights Management Workshop, vol. 2696 of LNCS, pp. 61\u201380. Springer (2003)","key":"186_CR15","DOI":"10.1007\/978-3-540-44993-5_5"},{"doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Pairing, vol. 4575 of LNCS, pp. 39\u201359. Springer (2007)","key":"186_CR16","DOI":"10.1007\/978-3-540-73489-5_4"},{"doi-asserted-by":"crossref","unstructured":"D\u2019Arco, P., De Santis, A.: Optimising SD and LSD in presence of non-uniform probabilities of revocation. In: Proceedings of ICITS 2007, vol. 4883 of LNCS, pp. 46\u201364. Springer (2009)","key":"186_CR17","DOI":"10.1007\/978-3-642-10230-1_4"},{"doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th IEEE Symposium on Foundations of Computer Science, pp. 427\u2013437 (1987)","key":"186_CR18","DOI":"10.1109\/SFCS.1987.4"},{"doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Advances in Cryptology\u2013CRYPTO \u201993, vol. 773 of LNCS, pp. 480\u2013491. Springer (1994)","key":"186_CR19","DOI":"10.1007\/3-540-48329-2_40"},{"key":"186_CR20","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00145-001-0006-7","volume":"14","author":"A Fiat","year":"2001","unstructured":"Fiat, A., Tessa, T.: Dynamic traitor tracing. J. Cryptol. 14, 211\u2013223 (2001)","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Advances in Cryptology\u2013CRYPTO\u201904, vol. 3152 of LNCS, pp. 511\u2013527. Springer (2004)","key":"186_CR21","DOI":"10.1007\/978-3-540-28628-8_31"},{"doi-asserted-by":"crossref","unstructured":"Gafni, E., Staddon, J., Yin, Y.L.: Efficient methods for integrating traceability and broadcast encryption. In: Advances in Cryptology\u2013Crypto\u201999, vol. 1666 of LNCS, pp. 372\u2013387 (1999)","key":"186_CR22","DOI":"10.1007\/3-540-48405-1_24"},{"doi-asserted-by":"crossref","unstructured":"Hwang, Y.H., Lee, P.J.: Efficient broadcast encryption scheme with log-key storage. In: Financial Cryptography, vol. 4107 of LNCS, pp. 281\u2013295. Springer (2006)","key":"186_CR23","DOI":"10.1007\/11889663_23"},{"doi-asserted-by":"crossref","unstructured":"Hwang, J.Y., Lee, D.H., Lim, J.: Generic transformation for scalable broadcast encryption schemes. In: Advances in Cryptology CRYPTO\u201905, vol. 3621 of LNCS, pp. 276\u2013292. Springer (2005)","key":"186_CR24","DOI":"10.1007\/11535218_17"},{"doi-asserted-by":"crossref","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Advances in Cryptology\u2013Crypto \u201902, vol. 2442 of LNCS, pp. 47\u201360 (2002)","key":"186_CR25","DOI":"10.1007\/3-540-45708-9_4"},{"doi-asserted-by":"crossref","unstructured":"Jho, N., Hwang, J.Y., Cheon, J.H., Kim, M., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Advances in Cryptology: EUROCRYPT\u201905, vol. 3494 of LNCS, pp. 559\u2013574. Springer (2005)","key":"186_CR26","DOI":"10.1007\/11426639_33"},{"doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Desmedt, Y.: Optimum traitor tracing and asymmetric schemes. In: Advances in Cryptology\u2013EUROCRYPT \u201998, vol. 1403 of LNCS, pp. 145\u2013157. Springer (1998)","key":"186_CR27","DOI":"10.1007\/BFb0054123"},{"doi-asserted-by":"crossref","unstructured":"Kiayias, A., Pehlivanoglu, S.: Pirate evolution: how to make the most of your traitor keys. In: Advances in Cryptology: CRYPTO\u2019 07, vol. 4622 of LNCS, pp. 448\u2013465. Springer (2007)","key":"186_CR28","DOI":"10.1007\/978-3-540-74143-5_25"},{"doi-asserted-by":"crossref","unstructured":"Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Advances in Cryptology\u2013Crypto \u201999. Lecture Notes in Computer Science vol. 1666, pp. 609\u2013623 (1999)","key":"186_CR29","DOI":"10.1007\/3-540-48405-1_38"},{"doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: Self protecting pirates and black-box traitor tracing. In: CRYPTO \u201901: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 63\u201379. Springer, London (2001)","key":"186_CR30","DOI":"10.1007\/3-540-44647-8_4"},{"doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: Traitor tracing with constant transmission rate. In: EUROCRYPT \u201902: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 450\u2013465. Springer, London (2002)","key":"186_CR31","DOI":"10.1007\/3-540-46035-7_30"},{"doi-asserted-by":"crossref","unstructured":"Luby, M., Staddon, J.: Combinatorial bounds for broadcast encryption. In: Advances in Cryptology\u2013Eurocrypt \u201998. Lecture Notes in Computer Science vol. 1403, pp. 512\u2013526 (1998)","key":"186_CR32","DOI":"10.1007\/BFb0054150"},{"doi-asserted-by":"crossref","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Advances in Cryptology\u2013EUROCRYPT \u201904, vol. 3027 of LNCS, pp. 153\u2013170. Springer Verlag (2004)","key":"186_CR33","DOI":"10.1007\/978-3-540-24676-3_10"},{"unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology: Crypto\u201901, vol. 2139 of LNCS, pp. 41\u201362. Springer-Verlag, (2001). Full version available at http:\/\/www.wisdom.weizmann.ac.il\/Naor\/","key":"186_CR34"},{"doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Proceedings of the 18th Annual International Conference on Financial Cryptography, LNCS, pp. 1\u201320 (2000)","key":"186_CR35","DOI":"10.1007\/3-540-45472-1_1"},{"doi-asserted-by":"crossref","unstructured":"Poovendran, R., Baras, J.S.: An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. IEEE Transactions on Information Theory, 47(7), 2824\u20132834, November 2001. Preliminary version in Advances in Cryptology: Crypto \u201999, Vol. 1666, pp. 624\u2013638, Springer Verlag (1999)","key":"186_CR36","DOI":"10.1109\/18.959263"},{"doi-asserted-by":"crossref","unstructured":"Pfitzmann, B.: Trials for traced traitors. In: Proceedings of the First International Workshop on Information Hiding, vol. 1174 of LNCS, pp. 49\u201363 Springer Verlag (1996)","key":"186_CR37","DOI":"10.1007\/3-540-61996-8_31"},{"unstructured":"Phan, D.H., Pointcheval, D., Strefler, M.: Security notions for broadcast encryption. In: Proceedings of ACNS 2011, vol. 6980 of LNCS, pp. 204\u2013221. Springer (2011)","key":"186_CR38"},{"doi-asserted-by":"crossref","unstructured":"Phan, D.H., Trinh, V.C.: Identity-based trace and revoke schemes. In: Proceedings of ProvSec 2011, vol. 6980 of LNCS, pp. 204\u2013221. Springer (2011)","key":"186_CR39","DOI":"10.1007\/978-3-642-24316-5_15"},{"doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Asymmetric fingerprinting for larger collusions. In: CCS \u201997: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 151\u2013160, ACM, New York (1997)","key":"186_CR40","DOI":"10.1145\/266420.266453"},{"issue":"5","key":"186_CR41","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"AT Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444\u2013458 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Safavi-Naini, R., Wang, Y.: Sequential traitor tracing. In: CRYPTO \u201900: Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, pp. 316\u2013332, Springer, London (2000)","key":"186_CR42","DOI":"10.1007\/3-540-44598-6_20"},{"doi-asserted-by":"crossref","unstructured":"Snoeyink, J., Suri, S., Varghese, G.: A lower bound for multicast key distribution. In: Proceedings of IEEE INFOCOMM 2001, pp. 422\u2013431 (2001)","key":"186_CR43","DOI":"10.1109\/INFCOM.2001.916725"},{"issue":"1","key":"186_CR44","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1137\/S0895480196304246","volume":"11","author":"DR Stinson","year":"1998","unstructured":"Stinson, D.R., Wei, R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discret. Math. 11(1), 41\u201353 (1998)","journal-title":"SIAM J. Discret. Math."},{"doi-asserted-by":"crossref","unstructured":"Stinson, D.R., Wei. R.: Key preassigned traceability schemes for broadcast encryption. In: SAC 98: Proceedings of the Selected Areas in Cryptography, pp. 144\u2013156, Springer, London (1998)","key":"186_CR45","DOI":"10.1007\/3-540-48892-8_12"},{"key":"186_CR46","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s00145-004-0214-z","volume":"18","author":"T Tassa","year":"2005","unstructured":"Tassa, T.: Low bandwidth dynamic traitor tracing schemes. J. Cryptol. 18, 167\u2013183 (2005)","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Waters, B.R.: Efficient identity-based encryption without random oracles. In: EUROCRYPT, LNCS, vol. of 3494, pp. 114\u2013127. Springer (2005)","key":"186_CR47","DOI":"10.1007\/11426639_7"},{"doi-asserted-by":"crossref","unstructured":"Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. In: Proceedings ACM SIGCOMM \u201998. ACM, September (1998)","key":"186_CR48","DOI":"10.1145\/285237.285260"},{"doi-asserted-by":"crossref","unstructured":"Wallner, D., Hardler, E., Agee, R.: Key management for multicast: issues and architectures. RFC 2627, National Security Agency, June (1999)","key":"186_CR49","DOI":"10.17487\/rfc2627"},{"unstructured":"Zhao, X., Zhang, F.: Traitor tracing against public collaboration. In: Proceedings of ISPEC 2011, vol. 6715 of LNCS, pp. 377\u2013394. Springer (2011)","key":"186_CR50"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0186-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-012-0186-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0186-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:50:38Z","timestamp":1745941838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-012-0186-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,4]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["186"],"URL":"https:\/\/doi.org\/10.1007\/s10207-012-0186-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2013,1,4]]}}}