A new traitor tracing

被引:0
|
作者
Mitsunari, S [1 ]
Sakai, R
Kasahara, M
机构
[1] Pixela Corp, Sakai, Osaka 5900985, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
[3] Osaka Gakuin Univ, Fac Informat, Suita, Osaka 5648511, Japan
关键词
traitor tracing; Weil pairing; elliptic curve;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
引用
收藏
页码:481 / 484
页数:4
相关论文
共 50 条
  • [1] New Approaches to Traitor Tracing with Embedded Identities
    Goyal, Rishab
    Koppula, Venkata
    Waters, Brent
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 : 149 - 179
  • [2] Hybrid traitor tracing
    Jin, Hongxia
    Lotspiech, Jeffery
    2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1329 - +
  • [3] Dynamic Traitor Tracing
    Amos Fiat
    Tamir Tassa
    Journal of Cryptology, 2001, 14 : 211 - 223
  • [4] Dynamic traitor tracing
    Fiat, A
    Tassa, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 211 - 223
  • [5] Sequential traitor tracing
    Safavi-Naini, R
    Wang, YJ
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 316 - 332
  • [6] Threshold traitor tracing
    Naor, M
    Pinkas, B
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 502 - 517
  • [7] Sequential traitor tracing
    Safavi-Naini, R
    Wang, YJ
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (05) : 1319 - 1326
  • [8] New traitor tracing scheme against anonymous attack
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +
  • [9] On perfect traitor tracing
    Desmedt, Y
    Burmester, M
    Kurosawa, K
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 439 - 439
  • [10] Efficient dynamic traitor tracing
    Berkman, O
    Parnas, M
    Sgall, J
    PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2000, : 586 - 595