Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fully collusion-resistant traitor tracing scheme with shorter ciphertexts

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-07T08:45:11Z-
dc.date.available2021-09-07T08:45:11Z-
dc.date.created2021-06-19-
dc.date.issued2011-09-
dc.identifier.issn0925-1022-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111655-
dc.description.abstractA traitor tracing scheme allows a content distributor to detect at least one of the traitors whose secret key is used to create a pirate decoder. In building efficient traitor tracing schemes, reducing ciphertext size is a significant factor since the traitor tracing scheme must handle a larger number of users. In this paper, we present a fully collusion-resistant traitor tracing scheme where the ciphertext size is 2.8 times shorter and encryption time is 2.6 times faster, compared to the best cases of fully collusion-resistant schemes previously suggested. We can achieve these efficiency results without sacrificing other costs. Also, our scheme supports public tracing and black-box tracing. To achieve our goal, we use asymmetric bilinear maps in prime order groups, and we introduce a new cancellation technique that has the same effect as that in composite order groups.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectBROADCAST ENCRYPTION-
dc.titleFully collusion-resistant traitor tracing scheme with shorter ciphertexts-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1007/s10623-010-9431-7-
dc.identifier.scopusid2-s2.0-79959373851-
dc.identifier.wosid000290806300004-
dc.identifier.bibliographicCitationDESIGNS CODES AND CRYPTOGRAPHY, v.60, no.3, pp.255 - 276-
dc.relation.isPartOfDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.titleDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.volume60-
dc.citation.number3-
dc.citation.startPage255-
dc.citation.endPage276-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusBROADCAST ENCRYPTION-
dc.subject.keywordAuthorTraitor tracing-
dc.subject.keywordAuthorBroadcast encryption-
dc.subject.keywordAuthorCollusion-resistance-
dc.subject.keywordAuthorPiracy-
dc.subject.keywordAuthorBilinear maps-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE