The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
반역자 추적 기법은 공급자가 허가되지 않은 사용자에게 개인 키를 불법적으로 제공한 악의적인 허가된 사용자를 추적할 수 있는 브로드캐스트 암호화 기법입니다. 기존 방식에는 몇 가지 문제가 있습니다. 그 중 하나는 다수의 반역자들에 의한 공모 공격에 대비하여 체계의 보안성을 인증하기 위한 키의 크기에 상한선이 존재하고, 그 한도가 증가함에 따라 헤더의 크기도 커지는 것이다. 우리는 헤더 크기가 반역자 수와 무관한 새로운 반역자 추적 방식을 제안할 것입니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Shigeo MITSUNARI, Ryuichi SAKAI, Masao KASAHARA, "A New Traitor Tracing" in IEICE TRANSACTIONS on Fundamentals,
vol. E85-A, no. 2, pp. 481-484, February 2002, doi: .
Abstract: A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e85-a_2_481/_p
부
@ARTICLE{e85-a_2_481,
author={Shigeo MITSUNARI, Ryuichi SAKAI, Masao KASAHARA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A New Traitor Tracing},
year={2002},
volume={E85-A},
number={2},
pages={481-484},
abstract={A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.},
keywords={},
doi={},
ISSN={},
month={February},}
부
TY - JOUR
TI - A New Traitor Tracing
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 481
EP - 484
AU - Shigeo MITSUNARI
AU - Ryuichi SAKAI
AU - Masao KASAHARA
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E85-A
IS - 2
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - February 2002
AB - A traitor tracing scheme is a broadcast encryption scheme in which a provider can trace malicious authorized users who illegally gave their personal keys to unauthorized users. The conventional schemes have some problems; one of them is that there exists an upper bound on the sizes of keys to certify the security of the scheme against a collusion attack by many traitors, and so that the size of the header increases according to the increase of the bound. We shall propose a new traitor tracing scheme where the header size is independent of the number of traitors.
ER -