1. School of Information Engineering, Chang'an University, Xi'an Shaanxi 710064, China
2. Shaanxi Road Traffic Detection and Equipment Engineering Technology Research Centre, Xi'an Shaanxi 710064, China
[1]CHOR B, FIAT A, NAOR M, et al. Tracing traitors[J]. IEEE Transactions on Information Theory, 2000, 46(3): 893-910. [2]BONEH D, AMIT S,BRENT W. Fully collusion resistant traitor tracing with short ciphertexts and private keys[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 211-220.[3]BONEH D, BRENT W. A fully collusion resistant broadcast, trace, and revoke system[C]// 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2006: 573-592. [4]FURUKAWA J, ATTRAPADUNG N. Fully collusion resistantblack-box traitor tracing revocable broadcast encryption with short private keys[C]// 34th International Colloquium on Automata, Languages and Programming. Berlin: Springer-Verlag, 2007: 496-508.[5]YANG B, WANG Q. An efficient traitor tracing scheme based on MDS code[C]//Proceedings of the Conference on Privacy, Security and Trust. Berlin: Springer-verlag, 2007: 824-832.[6]GARG S, KUMARASUBRAMANIAN,AMIT S A,et al. Building efficient fully collusion-resilient traitor tracing and revocation schemes[EB/OL]. [2011-10-25]. http://eprint.iacr.org/2009/532.pdf. [7]PARK J H, LEE D H. Fully collusion-resistant traitor tracing scheme[J/OL]. [2011-10-25]. http://protocol.korea.ac.kr/publication/Fully collusion-resistant traitor tracing scheme with shorter ciphertexts.pdf.[8]LYUU Y D, WU M L. A fully public key traitor tracing scheme[J]. WSEA Transactions on Circuits. 2002, 1(1): 88-93.[9]LV X X, YANG B. Efficient traitor tracing scheme based on NTRU[C]// The 6th International Conference on Parallel and Distributed Computing, Applications and Technologies. Washington, DC: IEEE Computer Society, 2005:120-124.[10]王青龙,韩臻,杨波.基于双线性映射的叛逆者追踪方案[J].计算机研究与发展,2009,46(3):384-389.[11]〖JP2〗张学军,曾智勇,周利华.面向多服务的基于大整数分解困难问题的叛逆者追踪方案[J].电子与信息学报,2007, 29(5): 471-475.[12]张学军,曾智勇,周利华.一种新的面向多服务抗共谋非对称公钥叛逆者追踪方案[J].四川大学学报, 2006, 38(4):110-116.