منابع مشابه
Anonymous trace and revoke
A broadcast encryption (BE) scheme is amethod for encryptingmessages in away that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem has very recently had some attention and some constructions are proposed to achieve anonymity. However, anonymity in a trace and revoke (TR) scheme has not been studied yet, and to...
متن کاملGeneric Trace and Revoke Scheme ∗
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt a content to a specific group of users called privileged users and prevent revoked users from decrypting the content even if they collude [6]. In BE schemes, a group of users, called traitors may collude and form a pirate decoder. In order to trace such actions, Traitor tracing (TT) schemes are proposed ...
متن کاملGeneric Construction of Trace and Revoke Schemes
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital content to a privileged set of users and in this way prevent revoked users from accessing the content. In BE schemes, a group of users, called traitors may leak their keys and enable an adversary to receive the content. Such malicious users can be detected through traitor tracing (TT) schemes. Th...
متن کاملIdentity-Based Trace and Revoke Schemes
Trace and revoke systems allow for the secure distribution of digital content in such a way that malicious users, who collude to produce pirate decoders, can be traced back and revoked from the system. In this paper, we consider such schemes in the identity-based setting, by extending the model of identity-based traitor tracing scheme by Abdalla et al. to support revocation. The proposed constr...
متن کاملAmendment to Trace and Revoke Systems with Short Ciphertexts
Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Recently, Liu and Yuan described a trace and revoke systems with short ciphertexts. In this paper, we show that their scheme cannot achieve traitor tracing, since any receiver can decide whether the given ciphertext is well-formed or not so as to decide wh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computational and Applied Mathematics
سال: 2014
ISSN: 0377-0427
DOI: 10.1016/j.cam.2013.10.019