A New Traitor Tracing
スポンサーリンク
概要
- 論文の詳細を見る
A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
- 社団法人電子情報通信学会の論文
- 2002-02-01
著者
-
SAKAI Ryuichi
Department of Marine Biochemistry, School of Marine Sciences, Kitasato University
-
Mitsunari Shigeo
Pixela Corporation
-
Sakai Ryuichi
Department Of Lightwave Sciences Osaka Electro-communication University
-
KASAHARA Masao
Faculty of Informatics, Osaka Gakuin University
-
Sakai Ryuichi
Department Of Growth Factor Division National Cancer Center Research Institute
-
Kasahara Masao
Faculty Of Informatics Osaka Gakuin University
-
Sakai Ryuichi
Department Of Electronics And Information Science Kyoto Institute Of Technology
関連論文
- Effects of lectin in the scleractinian coral Ctenactis echinata on symbiotic zooxanthellae
- Characterization of L-amino acid oxidase and antimicrobial activity of aplysianin A, a sea hare-derived antitumor-antimicrobial protein
- On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme (Special Section on Cryptgraphy and Information Security)
- A New Traitor Tracing
- Isolation and Characterization of a D-Galactose-binding Lectin from the Acorn Barnacle Balanus rostratus
- Suppression of gastric cancer dissemination by ephrin-B1-derived peptide
- P-283 LONG-CHAIN POLYAMINES FROM MARINE SPONGE : IMPLICATION IN THE SILICON BIOMINERALIZATION IN SPONGES
- A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness(Public Key Cryptography, Cryptography and Information Security)
- A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme (Asymmetric Cipher) (Cryptography and Information Security)
- New Key Generation Algorithm for RSA Cryptosystem (Special Section on Cryptography and Information Security)
- On the Unequal Error Protection Capability of a q-Ary Image 0f a L0W-Rate q^m-Ary Cyclic Code (Special Section on Information Theory and Its Applications)
- A New Attacking Method Based on Virtual Linear Transformation
- A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations(Public Key Cryptography)(Cryptography and Information Security)
- A Construction of Public-Key Cryptosystem Based on Algebraic Coding and Random Coding
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes