2006
DOI: 10.1007/11767480_6
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families

Abstract: A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor tracing scheme based on cover-free families. The new traitor tracing scheme is similar to the Boneh-Franklin scheme except that in the BonehFranklin scheme, decryption keys are derived from Reed-Solomon codes while in our case they are derived from a cover-free family. This results in much simpler and faster tracing algorithms for sing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 35 publications
(40 reference statements)
0
4
0
Order By: Relevance
“…Optionally, NVM unit is used to log the usage history. Although the single-key pirate model is simple but realistic in the pirate market [26] , the multi-key pirate decoder is easy in designing, practical in manufacturing with present semi-conductor technology, robust in defeating the traitor tracing algorithms, and cost-effective in comparing with the expensive broadcast subscription fee.…”
Section: Structure Of Pirate Decodermentioning
confidence: 99%
“…Optionally, NVM unit is used to log the usage history. Although the single-key pirate model is simple but realistic in the pirate market [26] , the multi-key pirate decoder is easy in designing, practical in manufacturing with present semi-conductor technology, robust in defeating the traitor tracing algorithms, and cost-effective in comparing with the expensive broadcast subscription fee.…”
Section: Structure Of Pirate Decodermentioning
confidence: 99%
“…Cover-free families have found many applications in cryptography and communications, including blacklisting [186], broadcast encryption [82,130,293,294], anti-jamming [98], source authentication in networks [269], group key predistribution [220,109,294,295], compression schemes [164], fault-tolerant signatures [156,165], frameproof/traceability codes [286,296], traitor tracing [298], batch signature verification [320], and one-time and multiple-times digital signature schemes [250,321].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, traceability allows to identify a traitor (or a coalition of traitors). Such schemes are called traitor tracing schemes and a variety of them was proposed, e.g., [20,55,56,48,66,67,53,11,30,60,70,44,64,45,46,51,25,19,57,68,18,28,65,1,9,13,41]. The combination of revocation and traceability is an aspiring goal.…”
Section: Introductionmentioning
confidence: 99%