메뉴 건너뛰기




Volumn , Issue , 2010, Pages 121-130

Building efficient fully collusion-resilient traitor tracing and revocation schemes

Author keywords

Pairing based cryptography; Trace revoke; Traitor tracing

Indexed keywords

CIPHERTEXTS; CRYPTOGRAPHIC SCHEMES; DECRYPTION TIME; DIFFIE HELLMAN; PAIRING-BASED CRYPTOGRAPHY; PRIME ORDERS; REVOCATION SCHEME; TRAITOR TRACING;

EID: 78650009814     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866322     Document Type: Conference Paper
Times cited : (71)

References (26)
  • 1
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • LNCS series. Springer-Verlag
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Proceedings of CRYPTO .04, LNCS series, pages 41-55. Springer-Verlag, 2004.
    • (2004) Proceedings of CRYPTO. 04 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 2
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • M. K. Franklin, editor, CRYPTO. Springer
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 4
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO, pages 258-275, 2005.
    • (2005) CRYPTO , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 5
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Second Theory of Cryptography Conference, TCC
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In Second Theory of Cryptography Conference, TCC, volume 3378 of LNCS, pages 325-341, 2005.
    • (2005) LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 8
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • EUROCRYPT 2006. Springer-Verlag
    • D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592. Springer-Verlag, 2006.
    • LNCS , vol.4004 , Issue.2006 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 10
    • 24944511263 scopus 로고    scopus 로고
    • Public traceability in traitor tracing schemes
    • H. Chabanne, D. H. Phan, and D. Pointcheval. Public traceability in traitor tracing schemes. In EUROCRYPT, pages 542-558, 2005.
    • (2005) EUROCRYPT , pp. 542-558
    • Chabanne, H.1    Phan, D.H.2    Pointcheval, D.3
  • 12
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Y. Dodis and N. Fazio. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Public Key Cryptography, pages 100-115, 2003.
    • (2003) Public Key Cryptography , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 14
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • C. Gentry and B. Waters. Adaptive security in broadcast encryption systems (with short ciphertexts). In EUROCRYPT, pages 171-188, 2009.
    • (2009) EUROCRYPT , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 15
    • 2642567536 scopus 로고    scopus 로고
    • Breaking and repairing asymmetric public-key traitor tracing
    • A. Kiayias and M. Yung. Breaking and repairing asymmetric public-key traitor tracing. In Digital Rights Management Workshop, pages 32-50, 2002.
    • (2002) Digital Rights Management Workshop , pp. 32-50
    • Kiayias, A.1    Yung, M.2
  • 16
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • A. Kiayias and M. Yung. Traitor tracing with constant transmission rate. In EUROCRYPT, pages 450-465, 2002.
    • (2002) EUROCRYPT , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 17
    • 35248866858 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In EUROCRYPT, pages 145-157, 1998.
    • (1998) EUROCRYPT , pp. 145-157
    • Kurosawa, K.1    Desmedt, Y.2
  • 20
    • 84959046713 scopus 로고    scopus 로고
    • Characterization of elliptic curve traces under fr-reduction
    • A. Miyaji, M. Nakabayashi, and S. Takano. Characterization of elliptic curve traces under fr-reduction. In ICISC, pages 90-108, 2000.
    • (2000) ICISC , pp. 90-108
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 21
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial Cryptography, pages 1-20, 2000.
    • (2000) Financial Cryptography , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 22
    • 84954420982 scopus 로고    scopus 로고
    • Trials of traced traitors
    • B. Pfitzmann. Trials of traced traitors. In Information Hiding, pages 49-64, 1996.
    • (1996) Information Hiding , pp. 49-64
    • Pfitzmann, B.1
  • 25
    • 84937577268 scopus 로고    scopus 로고
    • Efficient asymmetric public-key traitor tracing without trusted agents
    • Y. Watanabe, G. Hanaoka, and H. Imai. Efficient asymmetric public-key traitor tracing without trusted agents. In CT-RSA, pages 392-407, 2001.
    • (2001) CT-RSA , pp. 392-407
    • Watanabe, Y.1    Hanaoka, G.2    Imai, H.3
  • 26
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • B. Waters. Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In CRYPTO, pages 619-636, 2009.
    • (2009) CRYPTO , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.