Sciweavers

Share
PKC
2007
Springer

Identity-Based Traitor Tracing

10 years 6 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters’ identity-based encryption scheme.
Michel Abdalla, Alexander W. Dent, John Malone-Lee
Added 09 Jun 2010
Updated 09 Jun 2010
Type Conference
Year 2007
Where PKC
Authors Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
Comments (0)
books