{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:34Z","timestamp":1750307614717,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456520.1456525","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"9-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Public-key traitor tracing from efficient decoding and unbounded enrollment"],"prefix":"10.1145","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Google, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"633","volume":"4","author":"Berlekamp Elwyn R.","year":"1986","unstructured":"Elwyn R. Berlekamp and L. Welch , Error Correction of Algebraic Block Codes. U.S. Patent, Number 4 , 633 , 470 1986 . Elwyn R. Berlekamp and L. Welch, Error Correction of Algebraic Block Codes. U.S. Patent, Number 4, 633, 470 1986.","journal-title":"Error Correction of Algebraic Block Codes. U.S. Patent, Number"},{"key":"e_1_3_2_1_2_1","first-page":"338","volume-title":"CRYPTO","author":"Boneh Dan","year":"1999","unstructured":"Dan Boneh and Matthew Franklin , An Efficient Public Key Traitor Tracing Scheme , CRYPTO 1999 , pp. 338 -- 353 . Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme,CRYPTO 1999, pp. 338--353."},{"key":"e_1_3_2_1_3_1","volume-title":"An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of {2}","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matthew Franklin , An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of {2} , 2001 . Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, manuscript, full-version of {2}, 2001."},{"key":"e_1_3_2_1_4_1","first-page":"573","volume-title":"EUROCRYPT","author":"Boneh Dan","year":"2006","unstructured":"Dan Boneh , Amit Sahai and Brent Waters , Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , EUROCRYPT 2006 , pp. 573 -- 592 . Dan Boneh, Amit Sahai and Brent Waters, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, EUROCRYPT 2006, pp. 573--592."},{"key":"e_1_3_2_1_6_1","first-page":"257","volume-title":"14th Annual International Cryptology Conference","author":"Chor Benny","year":"1994","unstructured":"Benny Chor , Amos Fiat , and Moni Naor , Tracing Traitors , Advances in Cryptology - CRYPTO'94 , 14th Annual International Cryptology Conference , Santa Barbara , California, USA, August 21--25, 1994 , Proceedings. Lecture Notes in Computer Science 839 Springer 1994, pp. 257 -- 270 . Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors,Advances in Cryptology - CRYPTO'94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21--25, 1994, Proceedings. Lecture Notes in Computer Science 839 Springer 1994, pp. 257--270."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.841169"},{"key":"e_1_3_2_1_8_1","volume-title":"The design of Rijndael-AES the advanced encryption standard","author":"Daemen J.","year":"2002","unstructured":"J. Daemen and V. Rijmen , The design of Rijndael-AES the advanced encryption standard , Springer Verlag , 2002 . J. Daemen and V. Rijmen, The design of Rijndael-AES the advanced encryption standard, Springer Verlag, 2002."},{"key":"e_1_3_2_1_9_1","first-page":"100","author":"Dodis Yevgeniy","year":"2003","unstructured":"Yevgeniy Dodis , Nelly Fazio , Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , Public Key Cryptography 2003 , pp. 100 -- 115 . Yevgeniy Dodis, Nelly Fazio, Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, Public Key Cryptography 2003, pp. 100--115.","journal-title":"Public Key Cryptography"},{"key":"e_1_3_2_1_10_1","first-page":"372","volume-title":"CRYPTO","author":"Gafni Eli","year":"1999","unstructured":"Eli Gafni , Jessica Staddon and Yiqun Lisa Yin , Efficient Methods for Integrating Traceability and Broadcast Encryption , CRYPTO 1999 , pp. 372 -- 387 . Eli Gafni, Jessica Staddon and Yiqun Lisa Yin, Efficient Methods for Integrating Traceability and Broadcast Encryption,CRYPTO 1999, pp. 372--387."},{"key":"e_1_3_2_1_11_1","first-page":"333","volume-title":"Long-Lived Broadcast Encryption. CRYPTO 2000","author":"Garay Juan A.","unstructured":"Juan A. Garay , Jessica Staddon , Avishai Wool , Long-Lived Broadcast Encryption. CRYPTO 2000 : pp. 333 -- 352 . Juan A. Garay, Jessica Staddon, Avishai Wool, Long-Lived Broadcast Encryption. CRYPTO 2000: pp. 333--352."},{"key":"e_1_3_2_1_12_1","first-page":"28","volume-title":"Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In the Proceedings of the 39th Annual Symposium on Foundations of ComputerScience, IEEE Computer Society","author":"Guruswami Venkatesan","year":"1998","unstructured":"Venkatesan Guruswami and Madhu Sudan , Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In the Proceedings of the 39th Annual Symposium on Foundations of ComputerScience, IEEE Computer Society , pp. 28 -- 39 , 1998 . Venkatesan Guruswami and Madhu Sudan, Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In the Proceedings of the 39th Annual Symposium on Foundations of ComputerScience, IEEE Computer Society, pp. 28--39, 1998."},{"key":"e_1_3_2_1_13_1","first-page":"47","volume-title":"The LSD Broadcast Encryption Scheme. CRYPTO","author":"Halevy Dani","year":"2002","unstructured":"Dani Halevy , Adi Shamir , The LSD Broadcast Encryption Scheme. CRYPTO 2002 , pp. 47 -- 60 . Dani Halevy, Adi Shamir, The LSD Broadcast Encryption Scheme. CRYPTO 2002, pp. 47--60."},{"volume-title":"Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005:  559--574","author":"Jho Nam-Su","key":"e_1_3_2_1_14_1","unstructured":"Nam-Su Jho , Jung Yeon Hwang , Jung Hee Cheon , Myung-Hwan Kim , Dong Hoon Lee , Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559--574 . Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo: One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559--574."},{"key":"e_1_3_2_1_15_1","first-page":"63","volume-title":"CRYPTO","author":"Kiayias Aggelos","year":"2001","unstructured":"Aggelos Kiayias and Moti Yung , Self Protecting Pirates and Black-Box Traitor Tracing , CRYPTO 2001 , pp. 63 -- 79 . Aggelos Kiayias and Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing, CRYPTO 2001, pp. 63--79."},{"key":"e_1_3_2_1_16_1","volume-title":"Eurocrypt","author":"Kiayias Aggelos","year":"2002","unstructured":"Aggelos Kiayias and Moti Yung , Traitor Tracing with Constant Transmission Rate , Eurocrypt 2002 . Aggelos Kiayias and Moti Yung, Traitor Tracing with Constant Transmission Rate, Eurocrypt 2002."},{"key":"e_1_3_2_1_17_1","first-page":"22","volume-title":"Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop","author":"Kiayias Aggelos","year":"2001","unstructured":"Aggelos Kiayias , Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001 , pp. 22 -- 39 . Aggelos Kiayias, Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001, pp. 22--39."},{"key":"e_1_3_2_1_19_1","first-page":"145","volume-title":"International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 -","author":"Kurosawa K.","year":"1998","unstructured":"K. Kurosawa and Y. Desmedt , Optimum Traitor Tracing and Asymmetric Schemes,Advances in Cryptology - EUROCRYPT'98 , International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998 , Proceeding. Lecture Notes in Computer Science 1403 Springer 1998, pp. 145 -- 157 . K. Kurosawa and Y. Desmedt, Optimum Traitor Tracing and Asymmetric Schemes,Advances in Cryptology - EUROCRYPT'98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding. Lecture Notes in Computer Science 1403 Springer 1998, pp. 145--157."},{"key":"e_1_3_2_1_20_1","volume-title":"DIMACS Workshop on Management of Digital Intellectual Properties April 17--18","author":"Kurosawa K.","year":"2000","unstructured":"K. Kurosawa , M. Burmester and Y. Desmedt , A proven secure tracing algorithm for the optimal KD traitor tracing scheme , DIMACS Workshop on Management of Digital Intellectual Properties April 17--18 , 2000 . K. Kurosawa, M. Burmester and Y. Desmedt, A proven secure tracing algorithm for the optimal KD traitor tracing scheme, DIMACS Workshop on Management of Digital Intellectual Properties April 17--18, 2000."},{"key":"e_1_3_2_1_21_1","first-page":"172","volume-title":"5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC","author":"Kurosawa Kaoru","year":"2002","unstructured":"Kaoru Kurosawa , Takuya Yoshida , Linear Code Implies Public-Key Traitor Tracing. Public Key Cryptography , 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 , Paris, France, February 12--14, 2002, Proceedings. Lecture Notes in Computer Science 2274, pp. 172 -- 187 . Kaoru Kurosawa, Takuya Yoshida, Linear Code Implies Public-Key Traitor Tracing. Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12--14, 2002, Proceedings. Lecture Notes in Computer Science 2274, pp.172--187."},{"key":"e_1_3_2_1_22_1","volume-title":"North Holland","author":"MacWilliams F. J.","year":"1977","unstructured":"F. J. MacWilliams and N. Sloane , The Theory of Error Correcting Codes . North Holland , Amsterdam , 1977 . F. J. MacWilliams and N. Sloane, The Theory of Error Correcting Codes. North Holland, Amsterdam, 1977."},{"key":"e_1_3_2_1_23_1","volume-title":"7th International Symposium on Communications Theory and Applications","author":"McEliece Robert J.","year":"2003","unstructured":"Robert J. McEliece , On the Average List Size for the Guruswami-Sudan Decoder , 7th International Symposium on Communications Theory and Applications 2003 . Robert J. McEliece, On the Average List Size for the Guruswami-Sudan Decoder, 7th International Symposium on Communications Theory and Applications 2003."},{"key":"e_1_3_2_1_24_1","first-page":"41","volume-title":"Advances in Cryptology - CRYPTO","author":"Naor Dalit","year":"2001","unstructured":"Dalit Naor , Moni Naor and Jeffrey B. Lotspiech Revocation and Tracing Schemes for Stateless Receivers , Advances in Cryptology - CRYPTO 2001 , 21st Annual International Cryptology Conference, Santa Barbara , California, USA, August 19--23, 2001, Proceedings. Lecture Notes in Computer Science 2139 Springer 2001, pp. 41 -- 62 . Dalit Naor, Moni Naor and Jeffrey B. Lotspiech Revocation and Tracing Schemes for Stateless Receivers, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19--23, 2001, Proceedings. Lecture Notes in Computer Science 2139 Springer 2001, pp. 41--62."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"4th International Conference, FC 2000 Anguilla, British West Indies, February 20--24, 2000, Proceedings. Lecture Notes in Computer Science 1962 Springer","author":"Naor Moni","year":"2001","unstructured":"Moni Naor and Benny Pinkas , Efficient Trace and Revoke Schemes , Financial Cryptography , 4th International Conference, FC 2000 Anguilla, British West Indies, February 20--24, 2000, Proceedings. Lecture Notes in Computer Science 1962 Springer 2001 , pp. 1 -- 20 . Moni Naor and Benny Pinkas, Efficient Trace and Revoke Schemes, Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20--24, 2000, Proceedings. Lecture Notes in Computer Science 1962 Springer 2001, pp. 1--20."},{"key":"e_1_3_2_1_26_1","first-page":"24","volume-title":"ACISP","author":"Safavi-Naini Reinaneh","year":"2004","unstructured":"Reinaneh Safavi-Naini and Vu Dong To , Linear Code Implies Public-Key Traitor Tracingwith Revocation . Information Security and Privacy: 9th Australasian Conference , ACISP 2004 , Sydney, Australia, July 13--15, 2004. Proceedings. Lecture Notes in Computer Science 3108 Springer 2004, pp. 24 -- 35 . Reinaneh Safavi-Naini and Vu Dong To,Linear Code Implies Public-Key Traitor Tracingwith Revocation. Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13--15, 2004. Proceedings. Lecture Notes in Computer Science 3108 Springer 2004, pp.24--35."},{"volume-title":"Efficient Traitor Tracing Algorithms Using List Decoding. ASIACRYPT 2001: 175--192","author":"Silverberg Alice","key":"e_1_3_2_1_27_1","unstructured":"Alice Silverberg , Jessica Staddon , Judy L. Walker , Efficient Traitor Tracing Algorithms Using List Decoding. ASIACRYPT 2001: 175--192 . Alice Silverberg, Jessica Staddon, Judy L. Walker, Efficient Traitor Tracing Algorithms Using List Decoding. ASIACRYPT 2001:175--192."},{"key":"e_1_3_2_1_28_1","series-title":"Lecture Notes in Computer Science 1556","first-page":"144","volume-title":"the Proceedings of SAC'98","author":"Stinson Douglas","year":"1998","unstructured":"Douglas Stinson and Ruizhong Wei , Key preassigned traceability schemes for broadcast encryption , In the Proceedings of SAC'98 , Lecture Notes in Computer Science 1556 , Springer Verlag , pp. 144 -- 856 , 1998 . Douglas Stinson and Ruizhong Wei, Key preassigned traceability schemes for broadcast encryption, In the Proceedings of SAC'98, Lecture Notes in Computer Science 1556, Springer Verlag, pp. 144--856, 1998."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480196304246"},{"key":"e_1_3_2_1_30_1","first-page":"82","volume-title":"4th International Conference, ACNS","author":"Tonien Dongvu","year":"2006","unstructured":"Dongvu Tonien , Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. Applied Cryptography and Network Security , 4th International Conference, ACNS 2006 , Singapore, June 6--9, 2006, Proceedings. Lecture Notes in Computer Science 3989, pp. 82 -- 97 . Dongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6--9, 2006, Proceedings. Lecture Notes in Computer Science 3989, pp. 82--97."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 8th ACM workshop on Digital rights management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456520.1456525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456520.1456525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456520.1456525"}},"subtitle":["extended abstract"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":28,"alternative-id":["10.1145\/1456520.1456525","10.1145\/1456520"],"URL":"https:\/\/doi.org\/10.1145\/1456520.1456525","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}