Sciweavers

Share
IJNSEC
2007

A Traitor Tracing Scheme Based on the RSA System

9 years 10 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers can reveal the identities of the subscribers that were implicated in the construction of a pirate-device that illegally receives the digital content. In this paper, a traitor tracing scheme based on the RSA system is proposed. The scheme does not rely on any trusted third party, and is k-collusion resistant, can provide black-box confirmability, and revoke any traitor’s personal decryption key (without the limitation to threshold) without updating the personal decryption key of the remaining subscribers. And the scheme is more efficient than the ElGamal-like scheme according to complexity overload. Its security is the same as that of the RSA system.
Bo Yang, Hua Ma, Shenglin Zhu
Added 15 Dec 2010
Updated 15 Dec 2010
Type Journal
Year 2007
Where IJNSEC
Authors Bo Yang, Hua Ma, Shenglin Zhu
Comments (0)
books