A new traitor tracing

被引:0
|
作者
Mitsunari, S [1 ]
Sakai, R
Kasahara, M
机构
[1] Pixela Corp, Sakai, Osaka 5900985, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
[3] Osaka Gakuin Univ, Fac Informat, Suita, Osaka 5648511, Japan
关键词
traitor tracing; Weil pairing; elliptic curve;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
引用
收藏
页码:481 / 484
页数:4
相关论文
共 50 条
  • [11] Risky Traitor Tracing and New Differential Privacy Negative Results
    Goyal, Rishab
    Koppula, Venkata
    Russell, Andrew
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 467 - 497
  • [12] White Box Traitor Tracing
    Zhandry, Mark
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 303 - 333
  • [13] Efficient dynamic traitor tracing
    Berkman, O
    Parnas, M
    Sgall, J
    SIAM JOURNAL ON COMPUTING, 2001, 30 (06) : 1802 - 1828
  • [14] A new multi-service oriented traitor tracing scheme
    Zhang, Xue-Jun
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2008, 37 (03): : 404 - 407
  • [15] A code for sequential traitor tracing
    Safavi-Naini, R
    Wang, YJ
    ADVANCED SIGNAL PROCESSING FOR COMMUNICATION SYSTEMS, 2002, 703 : 211 - 224
  • [16] Randomised dynamic traitor tracing
    Trevathan, Jarrod
    Read, Wayne
    SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : 323 - +
  • [17] Cryptanalysis and modification of a traitor tracing scheme
    Wang, X. (wxmsq@eyou.com), 1600, Science Press (50):
  • [18] New scheme of dynamic traitor tracing against the immediate rebroadcast attack
    苏加军
    王新梅
    JournalofBeijingInstituteofTechnology, 2015, 24 (01) : 128 - 132
  • [19] Tuple decoders for traitor tracing schemes
    Oosterwijk, Jan-Jaap
    Doumen, Jeroen
    Laarhoven, Thijs
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2014, 2014, 9028
  • [20] EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
    Jin, Hongxia
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 270 - 273