A new traitor tracing

被引:0
|
作者
Mitsunari, S [1 ]
Sakai, R
Kasahara, M
机构
[1] Pixela Corp, Sakai, Osaka 5900985, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
[3] Osaka Gakuin Univ, Fac Informat, Suita, Osaka 5648511, Japan
关键词
traitor tracing; Weil pairing; elliptic curve;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
引用
收藏
页码:481 / 484
页数:4
相关论文
共 50 条
  • [41] On a traitor tracing scheme from ACISP 2003
    Tonien, Dongvu
    INFORMATION PROCESSING LETTERS, 2006, 100 (01) : 21 - 22
  • [42] Traitor tracing scheme and digital copyright protection
    Lab. of Computer Network and Info. Security, Xidian Univ., Xi'an 710071, China
    Jisuanji Gongcheng, 2006, 2 (151-152):
  • [43] Optimal symmetric Tardos traitor tracing schemes
    Thijs Laarhoven
    Benne de Weger
    Designs, Codes and Cryptography, 2014, 71 : 83 - 103
  • [44] A traitor tracing scheme based on the RSA scheme
    Yang Bo
    Mao Jane
    Zhu Shenglin
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 625 - +
  • [45] EM Decoding of Tardos Traitor Tracing Codes
    Furon, Teddy
    Perez-Freire, Luis
    MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, 2009, : 99 - 106
  • [46] Low Bandwidth Dynamic Traitor Tracing Schemes
    Tamir Tassa
    Journal of Cryptology, 2005, 18 : 167 - 183
  • [47] Traitor tracing for subscription-based systems
    Jin, Hongxia
    Lotspiech, Jeffory
    Blaum, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 223 - +
  • [48] Traitor Tracing After Visible Watermark Removal
    Mareen, Hannes
    De Praeter, Johan
    Van Wallendael, Glenn
    Lambert, Peter
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 110 - 123
  • [49] Low bandwidth dynamic traitor tracing schemes
    Tassa, T
    JOURNAL OF CRYPTOLOGY, 2005, 18 (02) : 167 - 183
  • [50] A Trade-off Traitor Tracing Scheme
    Ohtake, Go
    Ogawa, Kazuto
    Hanaoka, Goichiro
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 859 - 875