메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 609-626

Identity-based traitor tracing with short private key and short ciphertext

Author keywords

ciphertext; identity based; private key; Traitor tracing

Indexed keywords

BIT LENGTHS; BROADCAST ENCRYPTION SCHEMES; CIPHERTEXTS; CODEWORD; IDENTITY-BASED; PRIVATE KEY; PROVABLY SECURE; PUBLIC-KEY TRAITOR TRACING; RANDOM ORACLE MODEL; TRAITOR TRACING;

EID: 84865578457     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_35     Document Type: Conference Paper
Times cited : (13)

References (31)
  • 1
    • 33746332056 scopus 로고    scopus 로고
    • Identity-Based Encryption Gone Wild
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006 Springer, Heidelberg
    • Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-Based Encryption Gone Wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 300-311. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 300-311
    • Abdalla, M.1    Catalano, D.2    Dent, A.W.3    Malone-Lee, J.4    Neven, G.5    Smart, N.P.6
  • 2
    • 38049020476 scopus 로고    scopus 로고
    • Identity-Based Traitor Tracing
    • Okamoto, T., Wang, X. (eds.) PKC 2007 Springer, Heidelberg
    • Abdalla, M., Dent, A.W., Malone-Lee, J., Neven, G., Phan, D.H., Smart, N.P.: Identity-Based Traitor Tracing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 361-376. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 361-376
    • Abdalla, M.1    Dent, A.W.2    Malone-Lee, J.3    Neven, G.4    Phan, D.H.5    Smart, N.P.6
  • 3
    • 54249104590 scopus 로고    scopus 로고
    • Efficient Traitor Tracing from Collusion Secure Codes
    • Safavi-Naini, R. (ed.) ICITS 2008 Springer, Heidelberg
    • Billet, O., Phan, D.H.: Efficient Traitor Tracing from Collusion Secure Codes. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 171-182. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5155 , pp. 171-182
    • Billet, O.1    Phan, D.H.2
  • 4
    • 67650652430 scopus 로고    scopus 로고
    • Traitors Collaborating in Public: Pirates 2.0
    • Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
    • Billet, O., Phan, D.H.: Traitors Collaborating in Public: Pirates 2.0. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 189-205. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 189-205
    • Billet, O.1    Phan, D.H.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 33745166648 scopus 로고    scopus 로고
    • Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
    • Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 8
    • 70349289282 scopus 로고    scopus 로고
    • Traitor tracing with constant size ciphertext
    • Ning, P., Syverson, P.F., Jha, S. (eds.) ACM
    • Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM CCS 2008, pp. 501-510. ACM (2008)
    • (2008) ACM CCS 2008 , pp. 501-510
    • Boneh, D.1    Naor, M.2
  • 9
    • 33746104815 scopus 로고    scopus 로고
    • Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    • Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
    • Boneh, D., Sahai, A., Waters, B.: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 10
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897-1905 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 11
    • 34547269833 scopus 로고    scopus 로고
    • A fully collusion resistant broadcast, trace, and revoke system
    • Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM
    • Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM CCS 2006, pp. 211-220. ACM (2006)
    • (2006) ACM CCS 2006 , pp. 211-220
    • Boneh, D.1    Waters, B.2
  • 12
    • 24944511263 scopus 로고    scopus 로고
    • Public Traceability in Traitor Tracing Schemes
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Chabanne, H., Phan, D.H., Pointcheval, D.: Public Traceability in Traitor Tracing Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542-558. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 542-558
    • Chabanne, H.1    Phan, D.H.2    Pointcheval, D.3
  • 13
    • 84985922619 scopus 로고
    • Tracing Traitors
    • Desmedt, Y.G. (ed.) CRYPTO 1994 Springer, Heidelberg
    • Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 14
    • 38149117029 scopus 로고    scopus 로고
    • Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
    • Kurosawa, K. (ed.) ASIACRYPT 2007 Springer, Heidelberg
    • Delerablée, C.: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 15
    • 38149109883 scopus 로고    scopus 로고
    • Traitor Tracing with Optimal Transmission Rate
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007 Springer, Heidelberg
    • Fazio, N., Nicolosi, A., Phan, D.H.: Traitor Tracing with Optimal Transmission Rate. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 71-88. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4779 , pp. 71-88
    • Fazio, N.1    Nicolosi, A.2    Phan, D.H.3
  • 16
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • Wiener, M. (ed.) CRYPTO 1999 Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 17
    • 78650009814 scopus 로고    scopus 로고
    • Building efficient fully collusion-resilient traitor tracing and revocation schemes
    • Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
    • Garg, S., Kumarasubramanian, A., Sahai, A., Waters, B.: Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 121-130. ACM (2010)
    • (2010) ACM CCS 2010 , pp. 121-130
    • Garg, S.1    Kumarasubramanian, A.2    Sahai, A.3    Waters, B.4
  • 18
    • 33746062799 scopus 로고    scopus 로고
    • Practical Identity-Based Encryption Without Random Oracles
    • Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
    • Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 19
    • 50049123113 scopus 로고    scopus 로고
    • Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007 Springer, Heidelberg
    • Guo, F., Mu, Y., Chen, Z.: Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 392-406. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 392-406
    • Guo, F.1    Mu, Y.2    Chen, Z.3
  • 20
    • 54249167139 scopus 로고    scopus 로고
    • Multi-Identity Single-Key Decryption without Random Oracles
    • Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007 Springer, Heidelberg
    • Guo, F., Mu, Y., Chen, Z., Xu, L.: Multi-Identity Single-Key Decryption without Random Oracles. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 384-398. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4990 , pp. 384-398
    • Guo, F.1    Mu, Y.2    Chen, Z.3    Xu, L.4
  • 21
    • 84959054452 scopus 로고    scopus 로고
    • On Crafty Pirates and Foxy Tracers
    • Sander, T. (ed.) DRM 2001 Springer, Heidelberg
    • Kiayias, A., Yung, M.: On Crafty Pirates and Foxy Tracers. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 22-39. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2320 , pp. 22-39
    • Kiayias, A.1    Yung, M.2
  • 22
    • 35248831207 scopus 로고    scopus 로고
    • Breaking and Repairing Asymmetric Public-Key Traitor Tracing
    • Feigenbaum, J. (ed.) DRM 2002 Springer, Heidelberg
    • Kiayias, A., Yung, M.: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 32-50. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2696 , pp. 32-50
    • Kiayias, A.1    Yung, M.2
  • 23
    • 84947273176 scopus 로고    scopus 로고
    • Traitor Tracing with Constant Transmission Rate
    • Knudsen, L.R. (ed.) EUROCRYPT 2002 Springer, Heidelberg
    • Kiayias, A., Yung,M.: Traitor Tracing with Constant Transmission Rate. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 24
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Frankel, Y. (ed.) FC 2000 Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 25
    • 84954420982 scopus 로고    scopus 로고
    • Trials of Traced Traitors
    • Anderson, R. (ed.) IH 1996 Springer, Heidelberg
    • Pfitzmann, B.: Trials of Traced Traitors. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 49-64. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 49-64
    • Pfitzmann, B.1
  • 26
    • 84887285849 scopus 로고    scopus 로고
    • Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
    • Nguyên, P.Q. (ed.) VIETCRYPT 2006 Springer, Heidelberg
    • Phan, D.H.: Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 354-365. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 354-365
    • Phan, D.H.1
  • 27
    • 33746370427 scopus 로고    scopus 로고
    • Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006 Springer, Heidelberg
    • Phan, D.H., Safavi-Naini, R., Tonien, D.: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 264-275. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 264-275
    • Phan, D.H.1    Safavi-Naini, R.2    Tonien, D.3
  • 30
    • 0038447029 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • ACM
    • Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC 2003, pp. 116-125. ACM (2003)
    • (2003) STOC 2003 , pp. 116-125
    • Tardos, G.1
  • 31
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.