Bounds on Traceability Schemes
نویسندگان
چکیده
The Stinson-Wei traceability scheme (known as traceability scheme) was proposed for broadcast encryption as a generalization of the Chor-Fiat-Naor traceability scheme (known as traceability code). Cover-free family was introduced by Kautz and Singleton in the context of binary superimposed code. In this paper, we find a new relationship between a traceability scheme and a cover-free family, which strengthens the anti-collusion strength from t to t, that is, a t-traceability scheme is a t-cover-free family. Based on this interesting discovery, we derive new upper bounds for traceability schemes. By using combinatorial structures, we construct several infinite families of optimal traceability schemes which attain our new upper bounds. We also provide a constructive lower bound for traceability schemes, the size of which has the same order with our general upper bound. Meanwhile, we consider parent-identifying set system, an anti-collusion key-distributing scheme requiring weaker conditions than traceability scheme but stronger conditions than cover-free family. A new upper bound is also given for parent-identifying set systems. Index Terms Traceability scheme, broadcast encryption, cover-free family, parent-identifying set system, combinatorial design.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملNew results on frame-proof codes and traceability schemes
In this correspondence we derive lower bounds on the maximum number of codewords in a class of frameproof codes and traceability schemes, and give constructions for both with more codewords than the best known.
متن کاملComment on "New Results on Frame-Proof Codes and Traceability Schemes"
In the paper “New Results on Frame-Proof Codes and Traceability Schemes” by Reihaneh Safavi-Naini and Yejing Wang [IEEE Trans. Inform. Theory, vol. 47, no. 7, pp. 3029– 3033, Nov. 2001], there are lower bounds for the maximal number of codewords in binary frame-proof codes and decoders in traceability schemes. There are also existence proofs using a construction of binary frame-proof codes and ...
متن کاملOptimum Traitor Tracing and Asymmetric Schemes
A traceability scheme is a broadcast encryption scheme such that a data supplier T can trace malicious authorized users (traitors) who gave a decryption key to an unauthorized user (pirate). This paper rst derives lower bounds on the sizes of keys and ciphertexts. These bounds are all tight because an optimum one-time use scheme is also presented. We then propose a multiple-use scheme which app...
متن کاملA proven secure tracing algorithm for the optimal KD traitor tracing scheme (7 minutes for the Rump session)
A (k, n)-traceability scheme is a scheme in which at least one traitor is detected from a pirate key if there are at most k traitors among n authorized users. It has four components: key generation, an encryption algorithm, a decryption algorithm and a tracing algorithm. Kurosawa and Desmedt found lower bounds on the size of keys and the size of ciphertexts of traceability schemes [1]. They als...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1609.08336 شماره
صفحات -
تاریخ انتشار 2016