A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates

被引:0
|
作者
Matsushita, T
Imai, H
机构
[1] Toshiba Res & Dev Ctr, Saiwai Ku, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
public-key traitor tracing; black-box tracing; self-defensive pirates;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved against self-defensive pirate decoders. When assuming that a pirate decoder can take some self-defensive reaction (e.g., erasing all of the internal keys and shutting down) to escape from tracing if it detects tracing, it has been an open question to construct a sublinear black-box traitor tracing scheme that can detect efficiently at least one traitor (who builds the pirate decoder) with overwhelming probability, although a tracing algorithm that works successfully against self-defensive pirate decoders itself is known. In this paper, we answer affirmatively the above question by presenting a concrete construction of a public-key black-box tracing scheme in which the known tracing algorithm can be used while keeping the size of a ciphertext sublinear.
引用
收藏
页码:260 / 275
页数:16
相关论文
共 11 条
  • [1] A flexible-revocation scheme for efficient public-key black-box traitor tracing
    Matsushita, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) : 1055 - 1062
  • [2] Hierarchical key assignment for black-box tracing with efficient ciphertext size
    Matsushita, Tatsuyuki
    Imai, Hideki
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 92 - +
  • [3] A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
    Chen, Yi-Ruei
    Tzeng, Wen-Guey
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 121 - 134
  • [4] An Improved Collusion-resistant Public-key Traitor Tracing Scheme
    Guan Peipei
    Yang Yixian
    Niu Xinxin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 906 - +
  • [5] A public-key traitor tracing scheme with revocation using dynamic shares
    Tzeng, WG
    Tzeng, ZJ
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 207 - 224
  • [6] A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
    Wen-Guey Tzeng
    Zhi-Jia Tzeng
    Designs, Codes and Cryptography, 2005, 35 : 47 - 61
  • [7] A public-key traitor tracing scheme with revocation using dynamic shares
    Tzeng, WG
    Tzeng, ZJ
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) : 47 - 61
  • [8] A flexibly revocable key-distribution scheme for efficient black-box tracing
    Matsushita, T
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 197 - 208
  • [9] Collusion-resistant asymmetric public-key traitor tracing scheme for multi-channel services
    Zhang, Xue-Jun
    Yu, Guo-Lin
    Zhou, Li-Hua
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2006, 28 (11): : 2127 - 2129
  • [10] Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
    Biryukov, Alex
    Bouillaguet, Charles
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 63 - 84