A fully public-key traitor-tracing scheme
Resource
WSEAS Transactions on Circuits,1(1),88-93.
Journal
WSEAS Transactions on Circuits
Journal Volume
1
Journal Issue
1
Pages
88-93
Date Issued
2002
Date
2002
Author(s)
Wu, Ming-Luen
DOI
2006092712284417955
Abstract
We propose a fully public-key traitor-tracing scheme in which each subscriber can choose his or her own
private decryption key without others learning the key. The distributor of the digital content utilizes the public
data coming from all subscribers to compute a public encryption key. The paid contents are then transmitted to
the subscribers, after being encrypted with the public key. Each subscriber can decrypt the data using his or her
own secret key. Even if a coalition of subscribers conspire to create a pirate decoder with a tamper-free decryption
key, we have a tracing algorithm to trace them. Our scheme is long-lived, which means that the subscribers’ secret
keys need not be regenerated after the pirate key is detected or when subscribers join or leave the system. Finally,
our scheme guarantees anonymity.
Subjects
Public-key encryption
Broadcast encryption
Traitor tracing
Semantical security
Long livedness
Anonymity
Publisher
臺北市:國立臺灣大學資訊工程學系
Type
other
File(s)![Thumbnail Image]()
Loading...
Name
traitortracing.pdf
Size
149.73 KB
Format
Adobe PDF
Checksum
(MD5):f86fed9afe96406efef6218bde90a785
