Hierarchical key assignment for black-box tracing with efficient ciphertext size

被引:0
|
作者
Matsushita, Tatsuyuki [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Chuo Univ, Fac Sci & Engn, Bunkyo Ku, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Sec, Chiyoda Ku, Tokyo, Japan
关键词
hierarchical key assignment; black-box tracing; reduced ciphertext size;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a hierarchical key-assignment method to reduce the ciphertext size in a black-box tracing scheme presented at ASIA-CRYPT 2004. Applying the proposed method to this scheme, the ciphertext size is reduced from O(root n) to O(k+log(n/k)) without a substantial increase in the decryption-key size, where k, n denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme also supports black-box tracing and enjoys the following properties: Even if a pirate decoder does not respond any further queries when it detects itself being examined, the pirate decoder can be traced back to a person who participated in its construction. A tracer's key, which is necessary for black-box tracing, is public.
引用
收藏
页码:92 / +
页数:3
相关论文
共 50 条
  • [1] A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates
    Matsushita, T
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 260 - 275
  • [2] A flexibly revocable key-distribution scheme for efficient black-box tracing
    Matsushita, T
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 197 - 208
  • [3] A flexible-revocation scheme for efficient public-key black-box traitor tracing
    Matsushita, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) : 1055 - 1062
  • [4] TRACING THE CHARACTERISTIC CURVE OF A QUADRATIC BLACK-BOX
    SUN, J
    NETWORKS, 1989, 19 (06) : 637 - 650
  • [5] BorderPatrol: Isolating Events for Black-box Tracing
    Koskinen, Eric
    Jannotti, John
    EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, 2008, : 191 - 203
  • [6] Barriers to Black-Box Constructions of Traitor Tracing Systems
    Tang, Bo
    Zhang, Jiapeng
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 3 - 30
  • [7] IS ERP THE RIGHT KEY TO OPEN THE BLACK-BOX
    KARMOS, G
    CSEPE, V
    BEHAVIORAL AND BRAIN SCIENCES, 1990, 13 (02) : 245 - 245
  • [8] Blackdroid: A black-box way for Android plaintext and ciphertext privacy leaks detecting and guarding
    Zhang, Yan
    Wang, Yazhe
    Wang, Dan
    Zhou, Qihui
    Zhang, Ruoding
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 178 - 181
  • [9] Embedding black-box regression techniques into hierarchical Bayesian models
    Shaby, Benjamin A.
    Fink, Daniel
    JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2012, 82 (12) : 1753 - 1766
  • [10] Multi-Fidelity Black-Box Optimization with Hierarchical Partitions
    Sen, Rajat
    Kandasamy, Kirthevasan
    Shakkottai, Sanjay
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80