Presentation 2008-07-25
Traitor Tracing from ID based Broadcast Encryption
Ryuichi SAKAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) ID based broadcast encryption scheme based on MSK-TT key setting(ID-BE-MSK) has several new advantages. For example, every receiver can be managed by their identity information and the system can continuously subscribe and revoke receivers, when the total number of receivers is bounded. On the other hand, the system requires many public keys and many operations which is proportional to a number of receivers. These many public keys and operations are required when the set of the receivers is changed. This property is one of the disadvantage of ID-BE-MSK. Based on this property, this paper presents new traitor tracing scheme with resistance against the collusion attack which uses the keys linear combination of the private keys.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) identity based / broadcast encryption / traitor tracing / collusion resistance
Paper # ISEC2008-48
Date of Issue

Conference Information
Committee ISEC
Conference Date 2008/7/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Traitor Tracing from ID based Broadcast Encryption
Sub Title (in English)
Keyword(1) identity based
Keyword(2) broadcast encryption
Keyword(3) traitor tracing
Keyword(4) collusion resistance
1st Author's Name Ryuichi SAKAI
1st Author's Affiliation Faculty of Information and Communication Engineering, Osaka Electro-Communication University()
Date 2008-07-25
Paper # ISEC2008-48
Volume (vol) vol.108
Number (no) 162
Page pp.pp.-
#Pages 6
Date of Issue