2005
DOI: 10.1007/s10623-003-6150-3
|View full text |Cite
|
Sign up to set email alerts
|

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

Abstract: Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. Our scheme's traitor tracing and revocation programs cohere tightly. The size of the enabling block of our scheme is independent of the number of receivers. Each receiver holds one decryption key only. The distinct feature of our scheme is that when traitors are found, we can revoke their private keys (up to some threshold z) without updating the private keys of other … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
27
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(28 citation statements)
references
References 23 publications
1
27
0
Order By: Relevance
“…Since it is often distributing information of its own choice, it is assumed to have control over the group membership, i.e., the center is allowed to make decisions about who can join the group and whose membership should be revoked. This is in line with almost all multicast schemes such as [25,4,26,27,22,23,24].…”
Section: Preliminariessupporting
confidence: 85%
See 4 more Smart Citations
“…Since it is often distributing information of its own choice, it is assumed to have control over the group membership, i.e., the center is allowed to make decisions about who can join the group and whose membership should be revoked. This is in line with almost all multicast schemes such as [25,4,26,27,22,23,24].…”
Section: Preliminariessupporting
confidence: 85%
“…The price for this flexibility is the loss of the public key feature, which should not be a problem for many applications. However we observe that in many instantiations of our constructions, it is easy to "publicize" the encryption key, without affecting the security of the scheme, as demonstrated by works such as [22,23,24]. This effectively turns the scheme into a public key system and all the openness features are reinstalled.…”
Section: Preliminariesmentioning
confidence: 86%
See 3 more Smart Citations