[1] 李子臣, 杨义先. 一种认证加密方案的安全性分析[J]. 北京邮电大学学报, 1999, 22(3): 60-62. Li Zichen, Yang Yixian. A security analysis of an authenticated encryption scheme[J]. Journal of Beijing University of Posts and Telecommunications, 1999, 22(3): 60-62. [2] 张玉安, 冯登国. 一种实用的仿一次一密分组加密方案[J]. 北京邮电大学学报, 2005, 28(2): 101-104. Zhang Yu'an, Feng Dengguo. A practical one-time-pad-like block cipher scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(2): 101-104. [3] Chor B, Fiat A, Naor M. Tracing traitors// Desmedt Y. Advances in Cryptology in Proceedings Crypto'94. Berlin: Springer-Verlag, 1994: 257-270. [4] Tzeng W G, Tzeng Z J. A public-key traitor tracing scheme with revocation using dynamic shares // Kwangjo K. Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography. Berlin: Springer-Verlag, 2001: 207-224. [5] Mitsunari S, Sakai R, Kasahara M. A new traitor tracing[J]. IEICE Trans Fundamentals, 2002, E85-A(2): 481-484. [6] T V D, Safavi-Naini R, Zhang F. New traitor tracing schemes using bilinear map // Wang H, Pieprzyk J, Varadharajan V. Proeeding of the 2003 ACM Workshop on DRM. New York: ACM Press, 2003: 67-76. [7] Chabanne H, Hieu P D, Pointcheval D. Public traceability in traitor tracing schemes // Cramer R. Advances in Cryptology in Proceedings Eurocrypt?'05. Berlin: Springer-Verlag, 2005: 542-558. [8] Pfitzmann B. Trials of traced traitors // Ross J. Proceeding of Information Hiding Workshop (Information Hiding'96). Berlin:Springer-Verlag, 1996: 49-64. [9] Naor M, Pinkas B. Oblivious transfer and polynomial evaluation // Proceeding of the 31st Annual ACM Symposium on Theory of Computing. Atlanta: ACM Press, 1999: 245-254. |