1 G. Ateniese, "Untraceable rfid tags via insubvertible encryption" 92-101, 2005
2 B. Chor, "Tracing traitors" 257-270, 1994
3 D. Halevy, "The LSD broadcast encryption scheme" 47-60, 2002
4 S. D. Galbraith, "Supersingular curves in cryptography" 495-513, 2001
5 D. Boneh, "Short group signatures" 41-55, 2004
6 D. Naor, "Revocation and tracing schemes for stateless receivers" 41-62, 2001
7 Y. Dodis, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 100-115, 2003
8 J. H. Park, "Public key broadcast encryption schemes with shorter transmissions" IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 54 (54): 411-1, 2008
9 S. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008
10 A. Kiayias, "On crafy pirates and foxy tracers" 22-39, 2001
1 G. Ateniese, "Untraceable rfid tags via insubvertible encryption" 92-101, 2005
2 B. Chor, "Tracing traitors" 257-270, 1994
3 D. Halevy, "The LSD broadcast encryption scheme" 47-60, 2002
4 S. D. Galbraith, "Supersingular curves in cryptography" 495-513, 2001
5 D. Boneh, "Short group signatures" 41-55, 2004
6 D. Naor, "Revocation and tracing schemes for stateless receivers" 41-62, 2001
7 Y. Dodis, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 100-115, 2003
8 J. H. Park, "Public key broadcast encryption schemes with shorter transmissions" IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 54 (54): 411-1, 2008
9 S. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008
10 A. Kiayias, "On crafy pirates and foxy tracers" 22-39, 2001
11 D. Boneh, "Identity based encryption from the Weil pairing" 213-229, 2001
12 D. Boneh, "Fully collusion resistant traitor tracing with short ciphertexts and private keys" 573-592, 2006
13 E. Gahai, "Efficient methods for integrating traceability and broadcast encryption" 372-387, 1999
14 S. Garg, "Efficient fully collusion-resilient traitor tracing scheme"
15 M. T. Goodrich, "Effcient tree-based revocation in groups of low-state devices" 511-527, 2004
16 M. Naor, "Effcient trace and revoke schemes" 1-20, 2000
17 J. Camenisch, "Compact ecash, Cryptology ePrint Archive, Report"
18 D. Boneh, "Collusion resistant broadcast encryption with short ciphertexts and private keys" 258-275, 2005
19 A. Fiat, "Broadcast encryption" 480-491, 1993
20 M. Scott, "Authenticated id-based key exchange and remote login with simple token and pin number"
21 L. Ducas, "Anonymity from asymmetry,In New constructions for anonymous HIBE" 148-164, 2010
22 D. Boneh, "An effcient public key traitor tracing scheme" 338-353, 1999
23 C. Gentry, "Adaptive security in broadcast encryption systems (with short ciphertexts)" 171-188, 2009
24 W. Tzeng, "A public key traitor tracing scheme with revocation using dynamic shares" 207-224, 2001
25 N. McCullagh, "A new two-party identitybased authenticated key agreement" 262-274, 2005
26 J. H. Park, "A new public key broadcast encryption using Boneh Boyen Goh’s HIBE scheme" 101-115, 2008
27 D. Boneh, "A fully collusion resistant broadcast, trace, and revoke system" 211-220, 2006