Keyword : traitor tracing


How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 34-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor tracingcollusion attackcontent comparisonencodingwatermarkingc-secure code
 Summary | Full Text:PDF(857.6KB)

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 1000-1011
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
traitor tracingkey exposurekey updatetwo variable-polynomial
 Summary | Full Text:PDF(547.8KB)

Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes
Hans Georg SCHAATHUN Marcel FERNANDEZ 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2603-2608
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
collusion-secure fingerprintingcopyright protectiontraitor tracingsoft-decision decoding
 Summary | Full Text:PDF(182.7KB)

Obtaining Traceability Codes from Chinese Reminder Theorem Codes
Marcel FERNANDEZ Miguel SORIANO Josep COTRINA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 227-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Information Hiding
Keyword: 
fingerprintingtraitor tracingChinese Reminder Theorem
 Summary | Full Text:PDF(79.1KB)

On Collusion Security of Random Codes
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 296-304
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
fingerprintingwatermarkingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(427KB)

Collusion Secure Codes: Systematic Security Definitions and Their Relations
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1162-1171
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(408KB)

A New Traitor Tracing
Shigeo MITSUNARI Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/02/01
Vol. E85-A  No. 2 ; pp. 481-484
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
traitor tracingWeil pairingelliptic curve
 Summary | Full Text:PDF(180.6KB)

A Secure and Efficient Software Protection Model for Electronic Commerce
Sung-Min LEE Tai-Yun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/11/01
Vol. E84-B  No. 11 ; pp. 2997-3005
Type of Manuscript:  PAPER
Category: Software Platform
Keyword: 
software protectionelectronic commerce (EC)zero-knowledge prooftraitor tracing
 Summary | Full Text:PDF(508.6KB)

A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System
Maki YOSHIDA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 247-255
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
broadcast distribution systemsubscriber-excludingpirate decodertraitor tracingElGamal cryptosystem
 Summary | Full Text:PDF(250.5KB)