A new traitor tracing

被引:0
|
作者
Mitsunari, S [1 ]
Sakai, R
Kasahara, M
机构
[1] Pixela Corp, Sakai, Osaka 5900985, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
[3] Osaka Gakuin Univ, Fac Informat, Suita, Osaka 5648511, Japan
关键词
traitor tracing; Weil pairing; elliptic curve;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
引用
收藏
页码:481 / 484
页数:4
相关论文
共 50 条
  • [31] Traitor Tracing with Constant Size Ciphertext
    Boneh, Dan
    Naor, Moni
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 501 - 510
  • [32] Trade-off traitor tracing
    Ogawa, Kazuto
    Ohtake, Go
    Hanaoka, Goichiro
    Imai, Hideki
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 331 - +
  • [33] Public traceability in traitor tracing schemes
    Chabanne, H
    Phan, DH
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 542 - 558
  • [34] Dynamic Tardos Traitor Tracing Schemes
    Laarhoven, Thijs
    Doumen, Jeroen
    Roelse, Peter
    Skoric, Boris
    de Weger, Benne
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (07) : 4230 - 4242
  • [35] Traitor tracing for shortened and corrupted fingerprints
    Safavi-Naini, R
    Wang, YJ
    DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 81 - 100
  • [36] Identity-based traitor tracing
    Abdalla, Michel
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Phan, Duong Hieu
    Smart, Nigel P.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 361 - +
  • [37] Traitor tracing with constant transmission rate
    Kiayias, A
    Yung, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 450 - 465
  • [38] Flexible traitor tracing for anonymous attacks
    Jin, HX
    Lotspiech, J
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 269 - 270
  • [39] Traitor tracing against powerful attacks
    McNicol, S
    Boztas, S
    Rao, A
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1878 - 1882
  • [40] Bayesian methods for practical traitor tracing
    Zigoris, Philip
    Jin, Hongxia
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 194 - +