Digital signets: self-enforcing protection of digital information (preliminary version)

作者: Cynthia Dwork , Jeffrey Lotspiech , Moni Naor

DOI: 10.1145/237814.237997

关键词:

摘要:

参考文章(14)
Oded Goldreich, Towards a theory of software protection international cryptology conference. pp. 426- 439 ,(1987)
Dan Boneh, James Shaw, Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) international cryptology conference. pp. 452- 465 ,(1995)
Albert, Morse, Combatting Software Piracy by Encryption and Key Management IEEE Computer. ,vol. 17, pp. 68- 73 ,(1984) , 10.1109/MC.1984.1659112
Torben Pryds Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing international cryptology conference. pp. 129- 140 ,(1991) , 10.1007/3-540-46766-1_9
Benny Chor, Shafi Goldwasser, Silvio Micali, Baruch Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults 26th Annual Symposium on Foundations of Computer Science (sfcs 1985). pp. 383- 395 ,(1985) , 10.1109/SFCS.1985.64
O. Goldreich, S. Micali, A. Wigderson, How to play ANY mental game symposium on the theory of computing. pp. 218- 229 ,(1987) , 10.1145/28395.28420
R. Ostrovsky, Efficient computation on oblivious RAMs symposium on the theory of computing. pp. 514- 523 ,(1990) , 10.1145/100216.100289
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing. ,vol. 6, pp. 1673- 1687 ,(1997) , 10.1109/83.650120
Shafi Goldwasser, Silvio Micali, Ronald L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal on Computing. ,vol. 17, pp. 281- 308 ,(1988) , 10.1137/0217017