Identity-based Traitor Tracing

Abstract : We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters' identity-based encryption scheme.
Type de document :
Communication dans un congrès
Tatsuaki Okamoto and Xiaoyun Wang. PKC 2007, Apr 2007, Beijing, China. Springer, 4450, pp.361-376, 2007, Lecture Notes in Computer Science. 〈10.1007/978-3-540-71677-8_24〉
Liste complète des métadonnées

https://hal.inria.fr/hal-00918560
Contributeur : Michel Abdalla <>
Soumis le : vendredi 13 décembre 2013 - 16:40:25
Dernière modification le : vendredi 25 mai 2018 - 12:02:05

Lien texte intégral

Identifiants

Collections

Citation

Michel Abdalla, Alex Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, et al.. Identity-based Traitor Tracing. Tatsuaki Okamoto and Xiaoyun Wang. PKC 2007, Apr 2007, Beijing, China. Springer, 4450, pp.361-376, 2007, Lecture Notes in Computer Science. 〈10.1007/978-3-540-71677-8_24〉. 〈hal-00918560〉

Partager

Métriques

Consultations de la notice

189