Identity-based traitor tracing

  • Authors:
  • Michel Abdalla;Alexander W. Dent;John Malone-Lee;Gregory Neven;Duong Hieu Phan;Nigel P. Smart

  • Affiliations:
  • Département d'Informatique, Ecole Normale Supérieure, Paris Cedex 05, France;Information Security Group, Royal Holloway, University of London, Egham, Surrey, United Kingdom;Department Computer Science, University of Bristol, Bristol, United Kingdom;Département d'Informatique, Ecole Normale Supérieure, Paris Cedex 05, France and Department of Electrical Engineering, Katholieke Universiteit Leuven, Heverlee, Belgium;France Télécom R&D, Issy les Moulineaux Cedex 9, France;Department Computer Science, University of Bristol, Bristol, United Kingdom

  • Venue:
  • PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters' identity-based encryption scheme.