Presentation | 1999/7/23 Tracing and Masking Traitors Maki YOSHIDA, Toru FUJIWARA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper presents a traitor tracing scheme with maskable distribution. A traitor tracing scheme is a broadcast encryption scheme such that the data supplier can trace malicious authorized users (traitors) who leak their keys to an unauthorized user (a pirate user). A traitor tracing scheme can be used for pay-TV, CD-ROM distribution and online databases. To apply the scheme to an information providing service with periodic payment, it is required that even an authorized user cannot decrypt the data while he is in arrears with payment. In this paper, we propose a traitor tracing scheme with maskable distribution: For the authorized users and every data to be distributed, the data supplier can arbitrarily choose the subset of authorized users who cannot decrypt the data (masked users). Thus, traitors are easily expelled by being masked users, without affecting other authorized users. For the application where a masked user does not malicious, the privacy of masked users should not be disturbed. We present the privacy preserving scheme in the sense that no user can determine whether an authorized user is masked or not, except for himself. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Pay TV / Broadcast encryption / Traitor / Traitor tracing / Masking / Privacy |
Paper # | ISEC99-28 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1999/7/23(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Tracing and Masking Traitors |
Sub Title (in English) | |
Keyword(1) | Pay TV |
Keyword(2) | Broadcast encryption |
Keyword(3) | Traitor |
Keyword(4) | Traitor tracing |
Keyword(5) | Masking |
Keyword(6) | Privacy |
1st Author's Name | Maki YOSHIDA |
1st Author's Affiliation | Department of Informatics and Mathematical Science, Osaka University() |
2nd Author's Name | Toru FUJIWARA |
2nd Author's Affiliation | Department of Informatics and Mathematical Science, Osaka University |
Date | 1999/7/23 |
Paper # | ISEC99-28 |
Volume (vol) | vol.99 |
Number (no) | 209 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |