A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shigeo MITSUNARI, Ryuichi SAKAI, Masao KASAHARA, "A New Traitor Tracing" in IEICE TRANSACTIONS on Fundamentals,
vol. E85-A, no. 2, pp. 481-484, February 2002, doi: .
Abstract: A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e85-a_2_481/_p
Copy
@ARTICLE{e85-a_2_481,
author={Shigeo MITSUNARI, Ryuichi SAKAI, Masao KASAHARA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A New Traitor Tracing},
year={2002},
volume={E85-A},
number={2},
pages={481-484},
abstract={A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.},
keywords={},
doi={},
ISSN={},
month={February},}
Copy
TY - JOUR
TI - A New Traitor Tracing
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 481
EP - 484
AU - Shigeo MITSUNARI
AU - Ryuichi SAKAI
AU - Masao KASAHARA
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E85-A
IS - 2
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - February 2002
AB - A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
ER -