Keyword : collusion attack


How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 34-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor tracingcollusion attackcontent comparisonencodingwatermarkingc-secure code
 Summary | Full Text:PDF(857.6KB)

Systematic Generation of Tardos's Fingerprint Codes
Minoru KURIBAYASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/02/01
Vol. E93-A  No. 2 ; pp. 508-515
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
fingerprintingTardos's codechaotic mapcollusion attack
 Summary | Full Text:PDF(568.7KB)

Security Vulnerability of ID-Based Key Sharing Schemes
JungYeon HWANG Taek-Young YOUN Willy SUSILO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2641-2643
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
ID-based key exchangecollusion attack
 Summary | Full Text:PDF(80.2KB)

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA Satoshi FUJITSU Manabu HAGIWARA Hideki IMAI Takashi KITAGAWA Kazuto OGAWA Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 197-206
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
fingerprintc-secure codecollusion attacksecurity analysiswatermarkDRM
 Summary | Full Text:PDF(528.7KB)

Best Security Index for Digital Fingerprinting
Kozo BANNO Shingo ORIHARA Takaaki MIZUKI Takao NISHIZEKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 169-177
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Information Hiding
Keyword: 
collusion attackdigital watermarkingfingerprintingsecurity indexblock designsintersecting families
 Summary | Full Text:PDF(243.5KB)

A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code
Hajime WATANABE Takashi KITAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10 ; pp. 2589-2595
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
illegal copyfingerprintingwatermarkingcollusion attackc-Secure CRT Code
 Summary | Full Text:PDF(297.4KB)

Random-Error Resilience of a Short Collusion-Secure Code
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1147-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingcollusion attackcollusion-secure code
 Summary | Full Text:PDF(346.9KB)

New Security Index for Digital Fingerprinting and Its Bounds
Shingo ORIHARA Takaaki MIZUKI Takao NISHIZEKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1156-1163
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
collusion attackdigital watermarkingfingerprintingsecurity index
 Summary | Full Text:PDF(297.6KB)

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 222-230
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF(299.1KB)

An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8 ; pp. 1681-1690
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
credit-based paymentelectronic toll collection systemkey predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF(613.8KB)

A New Probabilistic ID-Based Non-interactive Key Sharing Scheme
Yasuyuki MURAKAMI Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 2-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
IDkey sharingnon-interactiveID-based non-interactive key sharing scheme (ID-NIKS)linear attackcollusion attack
 Summary | Full Text:PDF(429.7KB)

Attacking Method on Tanaka's Scheme**
Kiyomichi ARAKI Masato NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/03/25
Vol. E79-D  No. 3 ; pp. 247-248
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
key sharing schemecollusion attackShalkwijk algorithmlinear algebra
 Summary | Full Text:PDF(119.5KB)