An Efficient Public Key Traitor Tracing Scheme

作者: Dan Boneh , Matthew Franklin

DOI: 10.1007/3-540-48405-1_22

关键词:

摘要: We construct a public key encryption scheme in which there is one key, but many private decryption keys. If some digital content (e.g., music clip) encrypted using the and distributed through broadcast channel, then each legitimate user can decrypt its own key. Furthermore, if coalition of users collude to create new an effcient algorithm trace creators. Hence, our system provides simple solution "traitor tracing problem". Our deterministic, catches all active traitors while never accusing innocent users, although it only partially "black box". A minor modification enables resist adaptive chosen ciphertext attack. techniques apply error correcting codes discrete log representation problem.

参考文章(16)
D. R. Stinson, R. Wei, Key Preassigned Traceability Schemes for Broadcast Encryption Selected Areas in Cryptography. pp. 144- 156 ,(1999) , 10.1007/3-540-48892-8_12
Tatsuaki Okamoto, Shigenori Uchiyama, A new public-key cryptosystem as secure as factoring theory and application of cryptographic techniques. pp. 308- 318 ,(1998) , 10.1007/BFB0054135
Dan Boneh, The Decision Diffie-Hellman Problem algorithmic number theory symposium. pp. 48- 63 ,(1998) , 10.1007/BFB0054851
Moni Naor, Benny Pinkas, None, Threshold Traitor Tracing international cryptology conference. pp. 502- 517 ,(1998) , 10.1007/BFB0055750
Mihir Bellare, Oded Goldreich, Shafi Goldwasser, Incremental Cryptography: The Case of Hashing and Signing international cryptology conference. pp. 216- 233 ,(1994) , 10.1007/3-540-48658-5_22
Birgit Pfitzmann, Trials of Traced Traitors information hiding. pp. 49- 64 ,(1996) , 10.1007/3-540-61996-8_31
Kaoru Kurosawa, Yvo Desmedt, Optimum traitor tracing and asymmetric schemes theory and application of cryptographic techniques. pp. 145- 157 ,(1998) , 10.1007/BFB0054123
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Birgit Pfitzmann, Michael Waidner, Asymmetric fingerprinting for larger collusions computer and communications security. pp. 151- 160 ,(1997) , 10.1145/266420.266453
D. R. Stinson, R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes SIAM Journal on Discrete Mathematics. ,vol. 11, pp. 41- 53 ,(1998) , 10.1137/S0895480196304246