[1]
Lu Guan-Ming, Zong Fang. The theory of digital TV [M]. Beijing: Mechanical Industry Press, 2004. (in Chinese)
Google Scholar
[2]
F. Coutrot. V. Michon. A single conditional access system for satellite-cable and terrestrial TV. IEEE Transactions on Consumer electronics, 1989, Vol. 35, No. 3, 464-68.
DOI: 10.1109/30.44305
Google Scholar
[3]
ITU-R Rec. 810. Conditional-Access Broadcasting System, 1992.
Google Scholar
[4]
N. Lee, C. Chang, C. Lin, T. Hwang. Privacy and non-repudiation on pay-TV systems. IEEE Transactions on Consumer Electronics, 2000, Vol. 46, No. 1, 20-27.
DOI: 10.1109/30.826376
Google Scholar
[5]
D. Chaum,E. van Heyst. Group signatures [C].In: Advances in Cryptology-EUROCRYPT'91, LNCS 547,Springer- Verlag, 1991, 257-265.
DOI: 10.1007/3-540-46416-6_22
Google Scholar
[6]
R. K. Nichols. ICSA Guide to Cryptography[M]. Computing McGraw-Hill, first edition, December 1999.
Google Scholar
[7]
Li Feng-Yin, Yu ji-Guo, Ju Hong-Wei. A group signature scheme based on RSA [J]. Computer Engineering and Design, 2006, 27(16): 2955-2957. (in Chinese).
Google Scholar
[8]
G. Ateniese, J. Camenisch, M. Joye, et a1.A practical and provably secure coalition-resistant group signature scheme[C].In: Advances in Cryptology-CRYPTO00, LNCS 1880,Heidelberg: Springer-Verlag, 2000, 255-270.
DOI: 10.1007/3-540-44598-6_16
Google Scholar
[9]
D. Song.Practical forward secure group signature schemes[C].In: Proc of the 8th ACM Conf on Computer and Communication Security-CCS01, ACM, 2001, 225-234.
DOI: 10.1145/501983.502015
Google Scholar
[10]
Wang Ze-Cheng, Zhang Ya-Jun, Wang Jing-Ming. A group signature scheme based on elliptic curves[J], Tian-Zhong Journal, 2002, 17(5): 22-23. (in Chinese)
Google Scholar
[11]
Z. T. Jiang, Y. B. Wang, Y. Wang, Y. M. Wang. Investigations on smart card-based secure protocols for authenticated key establishment in digital pay-TV systems. Proceedings of the 8th IEEE International Conference on Cognitive Informatics-ICCI09, 2009, 538-541.
DOI: 10.1109/coginf.2009.5250680
Google Scholar
[12]
Xueming Wang, Yurong Dong. Threshold Group Signature Scheme with Privilege Subjects Based on ECC[C]. Communications and Intelligence Information Security-ICCIIS10, 2010, 84-87.
DOI: 10.1109/icciis.2010.64
Google Scholar