A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Public Key Traitor Tracing Scheme
[chapter]
1999
Lecture Notes in Computer Science
Hence, our system provides a simple and efficient solution to the "traitor tracing problem". A minor modification to the scheme enables it to resist an adaptive chosen ciphertext attack. ...
A public key traitor tracing encryption scheme is a public key encryption system in which there is a unique encryption key and multiple decryption keys. ...
An efficient construction for such a scheme will provide a useful solution to the public key traitor tracing problem. ...
doi:10.1007/3-540-48405-1_22
fatcat:ntimlled35bmrma4pzwkncamca
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing
[chapter]
2002
Lecture Notes in Computer Science
It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. 1 ...
We present new software copyright protection and electronic license distribution model based on public key scheme. ...
Applying Public Key Traitor Tracing In Public Key Traitor Tracing Scheme (PKTT ), there is one public encryption key, but many private decryption keys. ...
doi:10.1007/3-540-45705-4_34
fatcat:gcytzxarmbd2hhk66ouhu64dum
Traitor Tracing with Constant Transmission Rate
[chapter]
2002
Lecture Notes in Computer Science
An important open problem in the area of Traitor Tracing is designing a scheme with constant expansion of the size of keys (users' keys and the encryption key) and of the size of ciphertexts with respect ...
Then, we observe the simple yet crucial relation between (public-key) copyrighted encryption and (public-key) traitor tracing, which we exploit by introducing a generic design paradigm for designing constant ...
The Lemma provides a construction methodology for public-key traitor tracing schemes: given an n-key,c-copyrighted public-key encryption scheme the corresponding public-key traitor tracing scheme is the ...
doi:10.1007/3-540-46035-7_30
fatcat:t6p7cwqldra65bcs7avahoc4se
Breaking and Repairing Asymmetric Public-Key Traitor Tracing
[chapter]
2003
Lecture Notes in Computer Science
In this work, we break the two previous proposals for efficient asymmetric public-key traitor tracing, by showing how traitors can evade the proposed traitor tracing procedures. ...
Then, we present a new efficient Asymmetric Public-Key Traitor Tracing scheme for which we prove its traceability in detail (in the non-black-box model); to the best of our knowledge this is the first ...
As a result our proposal is the first efficient Asymmetric Public-Key Traitor Tracing Scheme. ...
doi:10.1007/978-3-540-44993-5_3
fatcat:zhqawa4qkjefrpjrarfppqgtai
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
[chapter]
2001
Lecture Notes in Computer Science
Furthermore, our scheme is as efficient as the previous most efficient symmetric or asymmetric traitor tracing schemes proposed so far. ...
Traitor tracing schemes deter traitors from giving away their keys to decrypt the contents by enabling the data supplier to identify the source of a redistributed copy. ...
Asymmetric Traitor Tracing with Agents [8] . Kurosawa and Desmedt suggested an efficient public key asymmetric traitor tracing scheme. ...
doi:10.1007/3-540-44586-2_17
fatcat:igpp2fwsendy3lu7ji7skrsom4
Extracting Group Signatures from Traitor Tracing Schemes
[chapter]
2003
Lecture Notes in Computer Science
The primitives are Group Signature Schemes and Public-Key Traitor Tracing. ...
Our first methodology applies to generic public-key traitor tracing schemes. We demonstrate its power by applying it to the Boneh-Franklin scheme, and obtaining its "dual" group signature. ...
We
Methodology #1: Group Signatures from Public-Key Traitor-Tracing Schemes
Description of a Public-Key Traitor Tracing Scheme A PK-traitor-tracing scheme involves three types of participants: the ...
doi:10.1007/3-540-39200-9_39
fatcat:aqtbceuxvnekjl4l3yqfmdj4ye
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
2010
Designs, Codes and Cryptography
We can achieve these efficiency results without sacrificing other costs. Also, our scheme supports public tracing and black-box tracing. ...
A traitor tracing scheme allows a content distributor to detect at least one of the traitors whose secret key is used to create a pirate decoder. ...
The traitor tracing scheme, introduced by Chor et al. [13] , is an infringement detection scheme that works by tracing the source of leaked decryption keys. ...
doi:10.1007/s10623-010-9431-7
fatcat:caiuu43fczhg5o2haeys2fiwom
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
[chapter]
2006
Lecture Notes in Computer Science
In Eurocrypt 2005, Chabanne, Phan and Pointcheval introduced an interesting property for traitor tracing schemes called public traceability, which makes tracing a black-box public operation. ...
The scheme has a black box tracing algorithm that always correctly identifies a traitor. The hybrid structure makes the system very efficient, both in terms of computation and communication cost. ...
Public Key Traitor Tracing Scheme with Public Traceability. A public key traitor tracing (PKTT) scheme is a public key broadcast encryption with an extra algorithm, the tracing algorithm. ...
doi:10.1007/11787006_23
fatcat:g3g5yhfmefexjerf5duxmsmyiq
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
[chapter]
2006
Lecture Notes in Computer Science
We propose the first constant ciphertext rate scheme which copes with such pirate decoders. Our scheme moreover supports black-box public traceability. c Springer-Verlag 2006. ...
These decoders can keep states between decryptions to detect whether they are being traced and are then able to take some counter-actions against the tracing process, such as "shutting down" or erasing ...
We then introduce an efficient generalization of the basic scheme to obtain an efficient general scheme. Although our basic scheme is significantly less efficient than Phan et al.' ...
doi:10.1007/11958239_24
fatcat:pjtfkb3lafbj7cicycsk7qdxiy
Traitors Collaborating in Public: Pirates 2.0
[chapter]
2009
Lecture Notes in Computer Science
These are not exactly traitor tracing schemes, but rather very efficient broadcast encryption schemes with some black-box tracing abilities. ...
In other words, traitors do not secretly collude but display part of their secret keys in a public place; pirate decoders are then built from this public information. ...
An extraction function is an efficiently computable function f that outputs information about the secret key.
Definition 3 (Masked Traitor). ...
doi:10.1007/978-3-642-01001-9_11
fatcat:ra6ad3bmnfbc5hbmlwx5ym7zji
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
2007
2007 IEEE International Conference on Communications
The users are also discouraged from indulging in illegal distribution of copyrighted material by employing an efficient public key based broadcast encryption scheme along with a deterministic traitor tracing ...
SAMcast is the first protocol, to the best of our knowledge, which provides an efficient integrity verification mechanism along with public key based broadcast encryption. ...
Traitor Tracing : Traitor Tracing schemes were introduced by Chor et al. ...
doi:10.1109/icc.2007.248
dblp:conf/icc/AhmadK07
fatcat:psktembrjjcrjg473rse74csgi
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
[chapter]
2001
Lecture Notes in Computer Science
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. ...
Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way. ...
The Public-Key Traitor Tracing Scheme In this section we present our traitor tracing scheme. ...
doi:10.1007/3-540-44586-2_16
fatcat:75zqnibsuncwzkesx7ouxxt2bm
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
2005
Designs, Codes and Cryptography
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. ...
Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way. ...
The Public-Key Traitor Tracing Scheme In this section we present our traitor tracing scheme. ...
doi:10.1007/s10623-003-6150-3
fatcat:homyt7zagbhqrd4kquw7sputca
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model
[chapter]
2013
Lecture Notes in Computer Science
there exists an efficient public key traitor tracing scheme that is completely collusion resistant. ...
An efficient construction for such a scheme will provide a useful solution to the public key traitor tracing problem". As far as we know, this problem is still open. ...
A breakthrough was proposed by Boneh-Franklin in [6] in which an efficient public key traitor tracing scheme was introduced. They considered three following tracing models: 1. ...
doi:10.1007/978-3-642-38553-7_8
fatcat:ga7rmbl6onefhadcxijydhkiua
An Improved Traitors Tracing Scheme Based on ELGamal
2011
Procedia Environmental Sciences
The flaw of traitor tracing schemes based on traditional ElGamal is that cannot resist convex combination attack. ...
On this point this paper raises an improved ElGamal scheme, which shorten the length of the private key. The new scheme uses the users private key and the header h(s, r) to computer session keys. ...
The ElGamal Traitor Tracing Scheme The ElGamal traitor tracing scheme is two level encryption which can improve the efficiency of the broadcast system. ...
doi:10.1016/j.proenv.2011.09.064
fatcat:qfxpnwhvozfe3jaw55awavx2pu
« Previous
Showing results 1 — 15 out of 2,775 results