Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tzeng, WG | en_US |
dc.contributor.author | Tzeng, ZJ | en_US |
dc.date.accessioned | 2014-12-08T15:44:21Z | - |
dc.date.available | 2014-12-08T15:44:21Z | - |
dc.date.issued | 2001 | en_US |
dc.identifier.isbn | 3-540-41658-7 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/29959 | - |
dc.description.abstract | We proposed a new public-key traitor tracing scheme with revocation capability using the dynamic share and entity revocation techniques. The enabling block of our scheme is independent of the number of subscribers, but dependent on the collusion and revocation thresholds. Each receiver holds one decryption key only. Our traitor tracing algorithm works in a black-box way and is conceptually simple. The distinct feature of our scheme is that when the traitors are found, we can revoke their private keys (up to some threshold z) without updating any private key of the remaining subscribers. Furthermore, we can restore the decryption privilege of a revoked private key later. We can actually increase the revocation capability beyond z with dynamic assignment of shares into the enabling block. This property makes our scheme highly practical. Previously proposed public-key traitor tracing schemes have to update all existing private keys even when revoking one private key only. Our scheme is as efficient as Boneh and Franklin's scheme in many aspects. Our traitor tracing scheme is fully k-resilient such that our traitor tracing algorithm can find all traitors if the number of them is k or less. The encryption algorithm of our scheme is semantically secure assuming that the decisional Diffie-Hellman problem is hard. We also proposed a variant traitor tracing scheme whose encryption algorithm is semantically secure against the adaptive chosen ciphertext attack assuming hardness of the decisional Diffie-Hellman problem. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | broadcast encryption | en_US |
dc.subject | traitor tracing | en_US |
dc.subject | revocation | en_US |
dc.title | A public-key traitor tracing scheme with revocation using dynamic shares | en_US |
dc.type | Article; Proceedings Paper | en_US |
dc.identifier.journal | PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS | en_US |
dc.citation.volume | 1992 | en_US |
dc.citation.spage | 207 | en_US |
dc.citation.epage | 224 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000174202400016 | - |
Appears in Collections: | Conferences Paper |