New Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps
نویسندگان
چکیده
We propose a new secret key traitor tracing scheme using bilinear maps, in which the size of the enabling-block in a broadcast message is independent of the number of subscribers. The proposed traitor tracing scheme can identify malicious subscribers (also called traitors) from a pirate decoder, which is collusively made by k or fewer traitors. Further, any malicious subscriber cannot falsify an unintended content for framing the broadcast center and cause all other personal keys to be exposed. We also give formal analyses to discuss the security of the proposed scheme in the random oracle model.
منابع مشابه
Public Traceability in Traitor Tracing Schemes
Traitor tracing schemes are of major importance for secure distribution of digital content. They indeed aim at protecting content providers from colluding users to build pirate decoders. If such a collusion happens, at least one member of the latter collusion will be detected. Several solutions have already been proposed in the literature, but the most important problem to solve remains having ...
متن کاملIdentity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The sch...
متن کاملA Fully Public-Key Traitor-Tracing Scheme
We propose a fully public-key traitor-tracing scheme in which each subscriber can choose his or her own private decryption key without others learning the key. The distributor of the digital content utilizes the public data coming from all subscribers to compute a public encryption key. The paid contents are then transmitted to the subscribers, after being encrypted with the public key. Each su...
متن کاملAttribute-Based Traitor Tracing
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (A...
متن کاملOptimal Public Key Traitor Tracing Scheme in Non-Black Box Model
In the context of secure content distribution, the content is encrypted and then broadcasted in a public channel, each legitimate user is provided a decoder and a secret key for decrypting the received signals. One of the main threat for such a system is that the decoder can be cloned and then sold out with the pirate secret keys. Traitor tracing allows the authority to identify the malicious u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010