Fully collusion resistant traitor tracing with short ciphertexts and private keys

被引:0
|
作者
Boneh, Dan [1 ]
Sahai, Amit
Waters, Brent
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generates ciphertexts of size O(root N) and private keys of size O(1). We first introduce a simpler primitive we call private linear broadcast encryption (PLBE) and show that any PLBE gives a tracing traitors system with the same parameters. We then show how to build a PLBE system with O(root N) size ciphertexts. Our system uses bilinear maps in groups of composite order.
引用
收藏
页码:573 / 592
页数:20
相关论文
共 43 条
  • [1] Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
    Jong Hwan Park
    Dong Hoon Lee
    [J]. Designs, Codes and Cryptography, 2011, 60 : 255 - 276
  • [2] Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (03) : 255 - 276
  • [3] Collusion resistant broadcast encryption with short ciphertexts and private keys
    Boneh, D
    Gentry, C
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 258 - 275
  • [4] Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys
    Furukawa, Jun
    Attrapadung, Nuttapong
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 496 - 508
  • [5] Collusion Resistant Traitor Tracing from Learning with Errors
    Goyal, Rishab
    Koppula, Venkata
    Waters, Brent
    [J]. STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 660 - 670
  • [6] COLLUSION RESISTANT TRAITOR TRACING FROM LEARNING WITH ERRORS
    Goyal, Rishab
    Koppula, Venkata
    Waters, Brent
    [J]. SIAM JOURNAL ON COMPUTING, 2020, 49 (05)
  • [7] Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
    Garg, Sanjam
    Kumarasubramanian, Abishek
    Sahai, Amit
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 121 - 130
  • [8] Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    Delerablee, Cecile
    Paillier, Pascal
    Pointcheval, David
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 39 - +
  • [9] An Improved Collusion-resistant Public-key Traitor Tracing Scheme
    Guan Peipei
    Yang Yixian
    Niu Xinxin
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 906 - +
  • [10] Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys
    Dutta, Subhranil
    Pal, Tapas
    Dutta, Ratna
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 241 - 258