Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC\u2707, Abdalla et al. proposed the first IBTT construction with short private key. In CCS\u2708, Boneh and Naor proposed a public-key traitor tracing, which can be extended to IBTT with short ciphertext. With a further exploration, in this paper, we propose the first IBTT with short private key and short ciphertext. Private key and ciphertext are both order of O(l 1+l 2), where l 1 is the bit length of codeword of fingerprint codes and l 2 is the bit length of group element. To present our IBTT scheme, we introduce a new primitive called identity-b...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In a traitor tracing scheme, each user is given a different decryption key. A content distributor ca...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
We construct the first fully collusion resistant tracing traitors system with sublinear size ciphert...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
To overcome the piracy problem in digital content distribution systems, a number of traitor tracing ...
A cover-free family is a well-studied combinatorial structure that has many applications in computer...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In a traitor tracing scheme, each user is given a different decryption key. A content distributor ca...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
International audienceTrace and revoke systems allow for the secure distribution of digital content ...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
We construct the first fully collusion resistant tracing traitors system with sublinear size ciphert...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
To overcome the piracy problem in digital content distribution systems, a number of traitor tracing ...
A cover-free family is a well-studied combinatorial structure that has many applications in computer...
Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital ...
In a traitor tracing scheme, each user is given a different decryption key. A content distributor ca...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...