|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
A New Traitor Tracing
Shigeo MITSUNARI Ryuichi SAKAI Masao KASAHARA
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E85-A
No.2
pp.481-484 Publication Date: 2002/02/01 Online ISSN:
DOI: Print ISSN: 0916-8508 Type of Manuscript: PAPER Category: Information Security Keyword: traitor tracing, Weil pairing, elliptic curve,
Full Text: PDF(180.6KB)>>
Summary:
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
|
|
|