Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
SIAM Journal on Discrete Mathematics
On codes with the identifiable parent property
Journal of Combinatorial Theory Series A
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Traitor Tracing with Constant Transmission Rate
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Decoding Codes with the Identifiable Parent Property
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
Efficient Traitor Tracing from Collusion Secure Codes
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Traitor tracing with constant size ciphertext
Proceedings of the 15th ACM conference on Computer and communications security
Traitors Collaborating in Public: Pirates 2.0
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Identity-based traitor tracing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Proceedings of the 17th ACM conference on Computer and communications security
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Designs, Codes and Cryptography
Traitor tracing against public collaboration
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Public traceability in traitor tracing schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fully collusion resistant traitor tracing with short ciphertexts and private keys
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A public-key traitor tracing scheme with an optimal transmission rate
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Hi-index | 0.00 |
Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing schemes were proposed. However, as stated by Billet and Phan in ICITS 2008, they were lacking in revocation ability. In this paper, we bring forward a codes based tracing and revoking scheme. Revocation ability helps to disable identified traitors and users who fail to fulfill the payments in each broadcast, so that the broadcast encryption system can be more practical. Based on Park et al.'s public key broadcast encryption scheme, we embed collusion secure code into each user's decryption keys so as we can send messages to a set of designated receivers while at the same time we can recover information of codeword from the feedback of the pirate decoder by employing Boneh and Naor's traitor tracing method. Our scheme achieves constant-size ciphertext which makes it suitable for situations where bandwidth is precious. Our scheme is based on collusion secure codes, and it can be extended to adopt other codes such as identifiable parent property (IPP) codes. Our method presents an answer to the problem left open by Billet and Phan.