[1]BENNY C,AMOS F,MONI N,et al.Tracing traitors[J].IEEE Trans on Inform Theory,2000,46:893-910.
[2]马华,曹正文.基于RSA加密算法的叛逆追踪方案[J].西安电子科技大学学报:自然科学版,2004,31(4):611-613.
[3]马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报:自然科学版,2006,33(3):422-424.
[4]MITSUNARI S,SAKAI R,KASAHARA M.A new traitor tracing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2002,E85-A(2):
481-484.
[5]BONEH D,FRANKLIN M.Identity based encryption from the weil pairing[C].Proc.of The 21st Annual International Cryptology Conference on Advances in Cryptology.London.UK:Springer-Verlag,2001:213-229.
[6]NAOR M,PINKAS B.Oblivious Transfer and Polynomial Evaluation[C].NY,USA:Proc.of the 31st Annual ACM Symposium on Theory of Computing,1999:245-254.
[7]吕锡香,张卫东,杨文峰.基于双线性映射的非对称公钥叛逆者追踪[J].计算机工程,2009,35(3):4-6.
[8]孙秀娟,金民锁,姜文彪.基于CRT的公密码算法应用研究[J].重庆科技学院学报:自然科学版,2010,12(6):162-164.
[9]张学军,王东勇,曾智勇,等.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报,2007,34(2):274-278.
[10]KLIMOV A,SHAMIR A.A new class of Invertible mappings[J].LNCS,2002(2523):470-483.
[11]KLIMOV A.Applications of t-functions in cryptography[D].The State of Israel:Weizmann Institute of Science,2005.
[12]ALEXANDER K,ADI S.New cryptographic primitives based on multiword t-functions[J].LNCS,2004(3017):1-15.
[13]KLIMOV A,SHAMIR A.Cryptographic applications of t-functions[J].LNCS,2003(3006):248-261.
[14]张玉丽,蔡庆军.一个高效的基于单圈T-函数的叛徒追踪方案[J].计算机工程,2009,45(11):97-98.
[15]张学军,周利华,王育民.改进的基于双线性映射叛逆者追踪方案[J].北京邮电大学学报,2006,29(6):17-20. |