A new traitor tracing

被引:0
|
作者
Mitsunari, S [1 ]
Sakai, R
Kasahara, M
机构
[1] Pixela Corp, Sakai, Osaka 5900985, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
[3] Osaka Gakuin Univ, Fac Informat, Suita, Osaka 5648511, Japan
关键词
traitor tracing; Weil pairing; elliptic curve;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
引用
收藏
页码:481 / 484
页数:4
相关论文
共 50 条
  • [21] Traitor Tracing against Public Collaboration
    Zhao, Xingwen
    Zhang, Fangguo
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 302 - 316
  • [22] Optimum traitor tracing and asymmetric schemes
    Kurosawa, K
    Desmedt, Y
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 145 - 157
  • [23] GENERALIZED TRAITOR TRACING FOR NESTED CODES
    Varna, Avinash L.
    Jin, Hongxia
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 561 - +
  • [24] Traitor tracing with optimal transmission rate
    Fazio, Nelly
    Nicolosi, Antonio
    Phan, Duong Hieu
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 71 - 88
  • [25] Dynamic Traitor Tracing Schemes, Revisited
    Laarhoven, Thijs
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 191 - 196
  • [26] Attribute-Based Traitor Tracing
    Wang, Yong-Tao
    Chen, Ke-Fei
    Chen, Jian-Hong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 181 - 195
  • [27] Improved algebraic traitor tracing scheme
    Bai, CY
    Feng, GL
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 217 - 227
  • [28] A combinatorial approach to asymmetric traitor tracing
    Safavi-Naini, R
    Wang, YJ
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2000, 1858 : 416 - 425
  • [29] Efficient coalition detection in traitor tracing
    Jin, Hongxia
    Lotspiech, Jeffery
    Megiddo, Nimrod
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 365 - +
  • [30] GROUP TESTING MEETS TRAITOR TRACING
    Meerwald, Peter
    Furon, Teddy
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 4204 - 4207