UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Optimum traitor tracing and asymmetric schemes

Kurosawa, K; Desmedt, Y; (1998) Optimum traitor tracing and asymmetric schemes. In: Nyberg, K, (ed.) ADVANCES IN CRYPTOLOGY - EUROCRYPT '98. (pp. 145 - 157). SPRINGER-VERLAG BERLIN

Full text not available from this repository.

Abstract

A traceability scheme is a broadcast encryption scheme such that a data supplier T can trace malicious authorized users (traitors) who gave a decryption key to an unauthorized user (pirate). This paper first derives lower bounds on the sizes of keys and ciphertexts. These bounds are all tight because an optimum one-time use scheme is also presented. We then propose a multiple-use scheme which approximately meets our bounds. This scheme is proven to be secure as well as much more efficient than the schemes by Chor, Fiat and Naor. Finally, practical types of asymmetric schemes with arbiter are discussed in which T cannot frame any authorized user as a traitor.

Type:Proceedings paper
Title:Optimum traitor tracing and asymmetric schemes
Event:International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 98)
Location:ESPOO, FINLAND
Dates:1998-05-31 - 1998-06-04
ISBN:3-540-64518-7
Keywords:THRESHOLD
UCL classification:UCL > School of BEAMS > Faculty of Engineering Science > Computer Science

Archive Staff Only: edit this record