Enforcing traceability in software (original) (raw)
References
D. Aucsmith, “Tamper Resistant Software-An Implementation”, Information Hiding, pp.317–333, Springer-Verlag, 1996. Google Scholar
T. Beth, H.-J. Knobloch, M. Otten, G.J. Simmons, P. Wichmann, “Towards Acceptable Key Escrow Systems”, Proceedings of the 2nd ACM Conference on Communications and Computer Security, 1994, pp.51–58. Google Scholar
M. Blaze, “Protocol Failure in the Escrowed Encryption Standard”, 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67. Google Scholar
E. Brickell, P. Gemmell, D. Kravitz, “Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change”, 1995 SIAM-ACM Symposium on Discrete Algorithms, pp.457–466. Google Scholar
C. Boyd, “Some Applications of Multiple Key Ciphers”, Advances in Cryptology-Eurocrypt 88, Springer-Verlag 1988, pp.455–467. Google Scholar
J. Camenisch, J.-M. Piveteau, M. Stadler, “An Efficient Fair Payment System”, 3rd ACM Conference on Computer and Communications Security, ACM Press 1996, pp.88–94. Google Scholar
E. Dawson, J. Golić (Eds.), “Cryptography: Policy and Algorithms”, Springer-Verlag, 1996. Google Scholar
D. Denning and D. Branstad, “A Taxonomy for Key Escrow Encryption Systems”, Communications of the ACM, 39,3 March 1996, pp.34–40. Article Google Scholar
Y. Desmedt, “Securing Traceability of Ciphertexts-Towards a Secure Software Key Escrow System”, Advances in Cryptology-Eurocrypt '95, Springer-Verlag 1995, pp.147–157. Google Scholar
W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22, 6, pp.644–654, 1976. Article Google Scholar
T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Transaction on Information Theory, IT-31, 4, pp.469–472, 1985. Google Scholar
FIPS PUB 185, “Escrowed Encryption Standard”, US Department of Commerce/National Institute of Standard and Technology, February 1994. Google Scholar
R. Ganesan, “The Yaksha System”, Communications of the ACM, 39,3 March 1996, pp.55–60. Article Google Scholar
P. Horster, M. Michels, H. Petersen, “A New Key Escrow System with Active Investigator”, Technical Report TR-95-4-F, University of Technology, ChemnitzZwickau, April 1995. Google Scholar
N. Jefferies, C. Mitchell, M. Walker, “A Proposed Architecture for Trusted Third Party Services”, Cryptography: Policy and Algorithms, LNCS 1029, Springer-Verlag, 1996, pp.98–104. Google Scholar
J. Kilian, T. Leighton, “Fair Cryptosystems, Revisited” Advances in Cryptology-Crypto 95, Springer-Verlag, 1995, pp.208–221. Google Scholar
L. Knudsen and T. Pedersen, “On the Difficulty of Software Key Escrow”, Advances in Cryptology-Eurocrypt 96, Springer-Verlag 1996, pp.237–244. Google Scholar
B. Preneel, P. C. van Oorschot, “MDx-MAC and Building Fast MACs from Hash Functions, Advances in Cryptology-Crypto 95, Springer-Verlag, 1995, pp.1–14. Google Scholar