Presentation 2006-07-21
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki MATSUSHITA, Hideki IMAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing scheme presented in [9] can be improved. The previous scheme with our hierarchical key-assignment yields a better balance between the transmission overhead and each receiver's storage than the original one alone. More concretely, the ciphertext size can be reduced from O(√) to O(k+log(n/k)) without a substantial increase in the secret-key size, where k and n denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme, as well as the previous one, is black-box traceable (without any secret information) against a self-defensive pirate decoder that escapes from tracing if it detects itself being examined.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Hierarchical key assignment / black-box tracing / self-defensive pirates
Paper # ISEC2006-52
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Sub Title (in English)
Keyword(1) Hierarchical key assignment
Keyword(2) black-box tracing
Keyword(3) self-defensive pirates
1st Author's Name Tatsuyuki MATSUSHITA
1st Author's Affiliation Corporate Research & Development Center, Toshiba Corporation()
2nd Author's Name Hideki IMAI
2nd Author's Affiliation Faculty of Science and Engineering, Chuo University:Research Center for information Security, National Institute of Advanced Industrial Science and Technology
Date 2006-07-21
Paper # ISEC2006-52
Volume (vol) vol.106
Number (no) 176
Page pp.pp.-
#Pages 8
Date of Issue