Anonymous trace and revoke

被引:3
|
作者
Ak, Murat [1 ]
Pehlivanoglu, Serdar [2 ]
Selcuk, Ali Aydin [3 ]
机构
[1] Akdeniz Univ, Dept Comp Engn, TR-07058 Antalya, Turkey
[2] Zirve Univ, Dept Comp Engn, Gaziantep, Turkey
[3] TOBB Univ Econ & Technol, Dept Comp Engn, Ankara, Turkey
关键词
Digital content distribution; Digital rights management; Broadcast encryption; Trace and revoke; Anonymity; Privacy;
D O I
10.1016/j.cam.2013.10.019
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to the best of our knowledge there is no construction for an anonymous TR system. In this paper, we present a generic transformation from an anonymous BE scheme into an anonymous TR scheme. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:586 / 591
页数:6
相关论文
共 50 条
  • [1] An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
    Blazy, Olivier
    Mukherjee, Sayantan
    Huyen Nguyen
    Duong Hieu Phan
    Stehle, Damien
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 214 - 233
  • [2] Renewable traitor tracing: A trace-revoke-trace system for anonymous attack
    Jin, Hongxia
    Lotspiech, Jeffery
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 563 - +
  • [3] A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
    Do, Xuan Thanh
    Phan, Duong Hieu
    Yung, Moti
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 145 - 164
  • [4] Efficient trace and revoke schemes
    Moni Naor
    Benny Pinkas
    [J]. International Journal of Information Security, 2010, 9 : 411 - 424
  • [5] Efficient trace and revoke schemes
    Naor, M
    Pinkas, B
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 1 - 20
  • [6] Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security
    Mandal, Mriganka
    Sarkar, Ramprasad
    Hur, Junbeom
    Nuida, Koji
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 168 - 189
  • [7] Efficient trace and revoke schemes
    Naor, Moni
    Pinkas, Benny
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 411 - 424
  • [8] Trace-and-Revoke Quadratic Functional Encryption
    Zheng, Qiuwei
    Zhao, Jun
    [J]. INFORMATION SECURITY, ISC 2023, 2023, 14411 : 496 - 515
  • [9] Identity-Based Trace and Revoke Schemes
    Duong Hieu Phan
    Viet Cuong Trinh
    [J]. PROVABLE SECURITY, 2011, 6980 : 204 - 221
  • [10] A scalable trace and revoke scheme with security enhancements
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1092 - 1096