Skip to Main content Skip to Navigation
Conference papers

Identity-based Traitor Tracing

Abstract : We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters' identity-based encryption scheme.
Document type :
Conference papers
Complete list of metadata
Contributor : Michel Abdalla Connect in order to contact the contributor
Submitted on : Friday, December 13, 2013 - 4:40:25 PM
Last modification on : Thursday, March 17, 2022 - 10:08:35 AM

Links full text



Michel Abdalla, Alex Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, et al.. Identity-based Traitor Tracing. PKC 2007, Apr 2007, Beijing, China. pp.361-376, ⟨10.1007/978-3-540-71677-8_24⟩. ⟨hal-00918560⟩



Record views