Filters








2,775 Hits in 4.3 sec

An Efficient Public Key Traitor Tracing Scheme [chapter]

Dan Boneh, Matthew Franklin
1999 Lecture Notes in Computer Science  
Hence, our system provides a simple and efficient solution to the "traitor tracing problem". A minor modification to the scheme enables it to resist an adaptive chosen ciphertext attack.  ...  A public key traitor tracing encryption scheme is a public key encryption system in which there is a unique encryption key and multiple decryption keys.  ...  An efficient construction for such a scheme will provide a useful solution to the public key traitor tracing problem.  ... 
doi:10.1007/3-540-48405-1_22 fatcat:ntimlled35bmrma4pzwkncamca

Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing [chapter]

Hyung-Woo Lee, Sung-Min Lee, Im-Yeong Lee
2002 Lecture Notes in Computer Science  
It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. 1  ...  We present new software copyright protection and electronic license distribution model based on public key scheme.  ...  Applying Public Key Traitor Tracing In Public Key Traitor Tracing Scheme (PKTT ), there is one public encryption key, but many private decryption keys.  ... 
doi:10.1007/3-540-45705-4_34 fatcat:gcytzxarmbd2hhk66ouhu64dum

Traitor Tracing with Constant Transmission Rate [chapter]

Aggelos Kiayias, Moti Yung
2002 Lecture Notes in Computer Science  
An important open problem in the area of Traitor Tracing is designing a scheme with constant expansion of the size of keys (users' keys and the encryption key) and of the size of ciphertexts with respect  ...  Then, we observe the simple yet crucial relation between (public-key) copyrighted encryption and (public-key) traitor tracing, which we exploit by introducing a generic design paradigm for designing constant  ...  The Lemma provides a construction methodology for public-key traitor tracing schemes: given an n-key,c-copyrighted public-key encryption scheme the corresponding public-key traitor tracing scheme is the  ... 
doi:10.1007/3-540-46035-7_30 fatcat:t6p7cwqldra65bcs7avahoc4se

Breaking and Repairing Asymmetric Public-Key Traitor Tracing [chapter]

Aggelos Kiayias, Moti Yung
2003 Lecture Notes in Computer Science  
In this work, we break the two previous proposals for efficient asymmetric public-key traitor tracing, by showing how traitors can evade the proposed traitor tracing procedures.  ...  Then, we present a new efficient Asymmetric Public-Key Traitor Tracing scheme for which we prove its traceability in detail (in the non-black-box model); to the best of our knowledge this is the first  ...  As a result our proposal is the first efficient Asymmetric Public-Key Traitor Tracing Scheme.  ... 
doi:10.1007/978-3-540-44993-5_3 fatcat:zhqawa4qkjefrpjrarfppqgtai

Efficient Asymmetric Self-Enforcement Scheme with Public Traceability [chapter]

Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
2001 Lecture Notes in Computer Science  
Furthermore, our scheme is as efficient as the previous most efficient symmetric or asymmetric traitor tracing schemes proposed so far.  ...  Traitor tracing schemes deter traitors from giving away their keys to decrypt the contents by enabling the data supplier to identify the source of a redistributed copy.  ...  Asymmetric Traitor Tracing with Agents [8] . Kurosawa and Desmedt suggested an efficient public key asymmetric traitor tracing scheme.  ... 
doi:10.1007/3-540-44586-2_17 fatcat:igpp2fwsendy3lu7ji7skrsom4

Extracting Group Signatures from Traitor Tracing Schemes [chapter]

Aggelos Kiayias, Moti Yung
2003 Lecture Notes in Computer Science  
The primitives are Group Signature Schemes and Public-Key Traitor Tracing.  ...  Our first methodology applies to generic public-key traitor tracing schemes. We demonstrate its power by applying it to the Boneh-Franklin scheme, and obtaining its "dual" group signature.  ...  We Methodology #1: Group Signatures from Public-Key Traitor-Tracing Schemes Description of a Public-Key Traitor Tracing Scheme A PK-traitor-tracing scheme involves three types of participants: the  ... 
doi:10.1007/3-540-39200-9_39 fatcat:aqtbceuxvnekjl4l3yqfmdj4ye

Fully collusion-resistant traitor tracing scheme with shorter ciphertexts

Jong Hwan Park, Dong Hoon Lee
2010 Designs, Codes and Cryptography  
We can achieve these efficiency results without sacrificing other costs. Also, our scheme supports public tracing and black-box tracing.  ...  A traitor tracing scheme allows a content distributor to detect at least one of the traitors whose secret key is used to create a pirate decoder.  ...  The traitor tracing scheme, introduced by Chor et al. [13] , is an infringement detection scheme that works by tracing the source of leaked decryption keys.  ... 
doi:10.1007/s10623-010-9431-7 fatcat:caiuu43fczhg5o2haeys2fiwom

Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability [chapter]

Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
2006 Lecture Notes in Computer Science  
In Eurocrypt 2005, Chabanne, Phan and Pointcheval introduced an interesting property for traitor tracing schemes called public traceability, which makes tracing a black-box public operation.  ...  The scheme has a black box tracing algorithm that always correctly identifies a traitor. The hybrid structure makes the system very efficient, both in terms of computation and communication cost.  ...  Public Key Traitor Tracing Scheme with Public Traceability. A public key traitor tracing (PKTT) scheme is a public key broadcast encryption with an extra algorithm, the tracing algorithm.  ... 
doi:10.1007/11787006_23 fatcat:g3g5yhfmefexjerf5duxmsmyiq

Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate [chapter]

Duong Hieu Phan
2006 Lecture Notes in Computer Science  
We propose the first constant ciphertext rate scheme which copes with such pirate decoders. Our scheme moreover supports black-box public traceability. c Springer-Verlag 2006.  ...  These decoders can keep states between decryptions to detect whether they are being traced and are then able to take some counter-actions against the tracing process, such as "shutting down" or erasing  ...  We then introduce an efficient generalization of the basic scheme to obtain an efficient general scheme. Although our basic scheme is significantly less efficient than Phan et al.'  ... 
doi:10.1007/11958239_24 fatcat:pjtfkb3lafbj7cicycsk7qdxiy

Traitors Collaborating in Public: Pirates 2.0 [chapter]

Olivier Billet, Duong Hieu Phan
2009 Lecture Notes in Computer Science  
These are not exactly traitor tracing schemes, but rather very efficient broadcast encryption schemes with some black-box tracing abilities.  ...  In other words, traitors do not secretly collude but display part of their secret keys in a public place; pirate decoders are then built from this public information.  ...  An extraction function is an efficiently computable function f that outputs information about the secret key. Definition 3 (Masked Traitor).  ... 
doi:10.1007/978-3-642-01001-9_11 fatcat:ra6ad3bmnfbc5hbmlwx5ym7zji

SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks

W. Ahmad, A. Khokhar
2007 2007 IEEE International Conference on Communications  
The users are also discouraged from indulging in illegal distribution of copyrighted material by employing an efficient public key based broadcast encryption scheme along with a deterministic traitor tracing  ...  SAMcast is the first protocol, to the best of our knowledge, which provides an efficient integrity verification mechanism along with public key based broadcast encryption.  ...  Traitor Tracing : Traitor Tracing schemes were introduced by Chor et al.  ... 
doi:10.1109/icc.2007.248 dblp:conf/icc/AhmadK07 fatcat:psktembrjjcrjg473rse74csgi

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares [chapter]

Wen-Guey Tzeng, Zhi-Jia Tzeng
2001 Lecture Notes in Computer Science  
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques.  ...  Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way.  ...  The Public-Key Traitor Tracing Scheme In this section we present our traitor tracing scheme.  ... 
doi:10.1007/3-540-44586-2_16 fatcat:75zqnibsuncwzkesx7ouxxt2bm

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

Wen-Guey Tzeng, Zhi-Jia Tzeng
2005 Designs, Codes and Cryptography  
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques.  ...  Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way.  ...  The Public-Key Traitor Tracing Scheme In this section we present our traitor tracing scheme.  ... 
doi:10.1007/s10623-003-6150-3 fatcat:homyt7zagbhqrd4kquw7sputca

Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model [chapter]

Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh
2013 Lecture Notes in Computer Science  
there exists an efficient public key traitor tracing scheme that is completely collusion resistant.  ...  An efficient construction for such a scheme will provide a useful solution to the public key traitor tracing problem". As far as we know, this problem is still open.  ...  A breakthrough was proposed by Boneh-Franklin in [6] in which an efficient public key traitor tracing scheme was introduced. They considered three following tracing models: 1.  ... 
doi:10.1007/978-3-642-38553-7_8 fatcat:ga7rmbl6onefhadcxijydhkiua

An Improved Traitors Tracing Scheme Based on ELGamal

Ya-Li Qi
2011 Procedia Environmental Sciences  
The flaw of traitor tracing schemes based on traditional ElGamal is that cannot resist convex combination attack.  ...  On this point this paper raises an improved ElGamal scheme, which shorten the length of the private key. The new scheme uses the users private key and the header h(s, r) to computer session keys.  ...  The ElGamal Traitor Tracing Scheme The ElGamal traitor tracing scheme is two level encryption which can improve the efficiency of the broadcast system.  ... 
doi:10.1016/j.proenv.2011.09.064 fatcat:qfxpnwhvozfe3jaw55awavx2pu
« Previous Showing results 1 — 15 out of 2,775 results