메뉴 건너뛰기




Volumn 31, Issue 1, 2012, Pages 59-69

Tracing and revoking scheme for dynamic privileges against pirate rebroadcast

Author keywords

Broadcast encryption; Dynamic privileges; Multi level security; Revocation; Traitor tracing

Indexed keywords

BROADCAST CHANNELS; BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; DIFFERENT SERVICES; DIGITAL CONTENTS; DYNAMIC SERVICES; MEDIA KEY BLOCK; MULTI-LEVEL SECURITY; REVOCATION; TRAITOR TRACING; TREE STRUCTURES;

EID: 84855989886     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.11.002     Document Type: Conference Paper
Times cited : (3)

References (29)
  • 1
    • 84858918037 scopus 로고    scopus 로고
    • Property-based broadcast encryption for multi-level security policies
    • D. Won, S. Kim, Vol. 3935 of Lecture Notes in Computer Science Springer
    • A. Adelsbach, U. Huber, and A.-R. Sadeghi Property-based broadcast encryption for multi-level security policies D. Won, S. Kim, ICISC Vol. 3935 of Lecture Notes in Computer Science 2005 Springer 15 31
    • (2005) ICISC , pp. 15-31
    • Adelsbach, A.1    Huber, U.2    Sadeghi, A.-R.3
  • 2
    • 0344196671 scopus 로고    scopus 로고
    • Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    • N. Attrapadung, K. Kobara, and H. Imai Sequential key derivation patterns for broadcast encryption and key predistribution schemes ASIACRYPT 2003 374 391
    • (2003) ASIACRYPT , pp. 374-391
    • Attrapadung, N.1    Kobara, K.2    Imai, H.3
  • 3
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • D. Boneh, and M.K. Franklin An efficient public key traitor tracing scheme CRYPTO 1999 338 353
    • (1999) CRYPTO , pp. 338-353
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 34547269833 scopus 로고    scopus 로고
    • A fully collusion resistant broadcast, trace, and revoke system
    • DOI 10.1145/1180405.1180432, 1180432, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • D. Boneh, and B. Waters A fully collusion resistant broadcast, trace, and revoke system ACM conference on computer and communications security 2006 211 220 (Pubitemid 47131370)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 211-220
    • Boneh, D.1    Waters, B.2
  • 7
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • C. Delerablée Identity-based broadcast encryption with constant size ciphertexts and private keys ASIACRYPT 2007 200 215
    • (2007) ASIACRYPT , pp. 200-215
    • Delerablée, C.1
  • 8
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • C. Delerablée, P. Paillier, and D. Pointcheval Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys Pairing 2007 39 59
    • (2007) Pairing , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 9
    • 0001293053 scopus 로고
    • Broadcast encryption
    • D.R. Stinson, Vol. 773 of Lecture Notes in Computer Science Springer
    • A. Fiat, and M. Naor Broadcast encryption D.R. Stinson, CRYPTO Vol. 773 of Lecture Notes in Computer Science 1993 Springer 480 491
    • (1993) CRYPTO , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 10
    • 84957076207 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • A. Fiat, and T. Tassa Dynamic traitor tracing CRYPTO 1999 354 371
    • (1999) CRYPTO , pp. 354-371
    • Fiat, A.1    Tassa, T.2
  • 11
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • Vol. 5479 of Lecture Notes in Computer Science Springer-Verlag
    • C. Gentry, and B. Waters Adaptive security in broadcast encryption systems (with short ciphertexts) EUROCRYPT 2009 Vol. 5479 of Lecture Notes in Computer Science 2009 Springer-Verlag 171 188
    • (2009) EUROCRYPT 2009 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 12
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • M.T. Goodrich, J.Z. Sun, and R. Tamassia Efficient tree-based revocation in groups of low-state devices CRYPTO 2004 511 527
    • (2004) CRYPTO , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 13
    • 84937435227 scopus 로고    scopus 로고
    • The lsd broadcast encryption scheme
    • M. Yung, Vol. 2442 of Lecture Notes in Computer Science Springer
    • D. Halevy, and A. Shamir The lsd broadcast encryption scheme M. Yung, CRYPTO Vol. 2442 of Lecture Notes in Computer Science 2002 Springer 47 60
    • (2002) CRYPTO , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 14
    • 79957880317 scopus 로고    scopus 로고
    • Broadcast encryption for differently privileged
    • D. Gritzalis, J. Lopez, Vol. 297 of IFIP Springer
    • H. Jin, and J. Lotspiech Broadcast encryption for differently privileged D. Gritzalis, J. Lopez, SEC Vol. 297 of IFIP 2009 Springer 283 293
    • (2009) SEC , pp. 283-293
    • Jin, H.1    Lotspiech, J.2
  • 17
    • 38049163807 scopus 로고    scopus 로고
    • Pirate evolution: How to make the most of your traitor keys
    • A. Kiayias, and S. Pehlivanoglu Pirate evolution: how to make the most of your traitor keys CRYPTO 2007 448 465
    • (2007) CRYPTO , pp. 448-465
    • Kiayias, A.1    Pehlivanoglu, S.2
  • 18
    • 68849127956 scopus 로고    scopus 로고
    • Tracing and revoking pirate rebroadcasts
    • M. Abdalla, D. Pointcheval, P.-A. Fouque, D. Vergnaud, Vol. 5536 of Lecture Notes in Computer Science
    • A. Kiayias, and S. Pehlivanoglu Tracing and revoking pirate rebroadcasts M. Abdalla, D. Pointcheval, P.-A. Fouque, D. Vergnaud, ACNS Vol. 5536 of Lecture Notes in Computer Science 2009 253 271
    • (2009) ACNS , pp. 253-271
    • Kiayias, A.1    Pehlivanoglu, S.2
  • 19
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • A. Kiayias, and M. Yung Traitor tracing with constant transmission rate EUROCRYPT 2002 450 465
    • (2002) EUROCRYPT , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 20
    • 58449125766 scopus 로고    scopus 로고
    • Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption
    • M. Kusakawa, H. Hiwatari, T. Asano, and S. Matsuda Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption CANS 2008 31 48
    • (2008) CANS , pp. 31-48
    • Kusakawa, M.1    Hiwatari, H.2    Asano, T.3    Matsuda, S.4
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor, M. Naor, and J. Lotspiech Revocation and tracing schemes for stateless receivers J. Kilian, CRYPTO Vol. 2139 of Lecture Notes in Computer Science 2001 Springer 41 62 (Pubitemid 33317907)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 23
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Financial Cryptography
    • M. Naor, and B. Pinkas Efficient trace and revoke schemes Financial cryptography 2000 1 20 (Pubitemid 33359593)
    • (2001) Lecture Notes in Computer Science , Issue.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 24
    • 62649173578 scopus 로고    scopus 로고
    • Fully cca2 secure identity based broadcast encryption without random oracles
    • Y. Ren, and D. Gu Fully cca2 secure identity based broadcast encryption without random oracles Inf Process Lett 109 11 2009 527 533
    • (2009) Inf Process Lett , vol.109 , Issue.11 , pp. 527-533
    • Ren, Y.1    Gu, D.2
  • 25
    • 84974601983 scopus 로고    scopus 로고
    • Sequential traitor tracing
    • R. Safavi-Naini, and Y. Wang Sequential traitor tracing CRYPTO 2000 316 332
    • (2000) CRYPTO , pp. 316-332
    • Safavi-Naini, R.1    Wang, Y.2
  • 26
    • 38149030386 scopus 로고    scopus 로고
    • Technical reports, Cryptology ePrint Archive, Report 2007/217
    • R. Sakai, and J. Furukawa Identity-based broadcast encryption Technical reports, Cryptology ePrint Archive, Report 2007/217 2007 http://eprint.iacr.org/ 2007/217
    • (2007) Identity-based Broadcast Encryption
    • Sakai, R.1    Furukawa, J.2
  • 27
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A.T. Sherman, and D.A. McGrew Key establishment in large dynamic groups using one-way function trees IEEE Trans Software Eng 29 5 2003 444 458
    • (2003) IEEE Trans Software Eng , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.