DOI QR코드

DOI QR Code

개인키 업데이트가 가능한 공개키 기반 공모자 추적 암호 알고리즘

A Public Key Traitor Tracing Scheme with Key-update Method

  • 투고 : 2011.11.01
  • 심사 : 2012.01.27
  • 발행 : 2012.02.05

초록

Traitor Tracing schemes are broadcast encryption systems where at least one of the traitors who were implicated in the construction of a pirate decoder can be traced. This traceability is required in various contents delivery system like satellite broadcast, DMB, pay-TV, DVD and so on. In this paper, we propose a public key traitor tracing scheme with key-update method. If the system manager can update a secret key which is stored in an authorized decode, it makes a pirate decoder useless by updating a secret key A pirate decoder which cannot update a secret key does not decrypt contents in next session or during tracing a traitor, this scheme has merits which will make a pirate decoder useless, therefore this scheme raises the security to a higher level.

키워드

참고문헌

  1. A. Kiayias, M. Yung, "On Crafty Pirates and Foxy Tracers", DRM 2001, LNCS 2320.
  2. A. Kiayias, M. Yung, "Traitor Tracing with Constant Transmission Rate", Eurocrypt 2002, LNCS 2332.
  3. A. Kiayias, S. Pehlivanoglu, "Pirate Evolution : How to Make the Most of Your Traitor Keys", Crypto 2007.
  4. D. A. McGrew, A. T. Sherman, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees", IEEE Transactions on Software Engineering 2003, Vol. 29, No. 5.
  5. D. Boneh, B. Waters, "A Fully Collusion Resistant Broadcast Trace and Revoke System", ACM CCS 2006.
  6. D. Boneh, M. Franklin, "An Efficient Public Key Traitor Tracing Scheme", Crypto 1999, LNCS 1666.
  7. D. Naor, M. Naor, J. B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers, Crypto 2001, LNCS 2139.
  8. K. Kurosawa, Y. Desmedt, "Optimum Traitor Tracing and Asymmetric Schemes", Eurocrypt 1998, LNCS 1403.
  9. K. Kurosawa, T. Yoshida, "Linear Code Implies Public Key Traitor Tracing", PKC 2002, LNCS 2274.
  10. T. Matsushita, H. Imai, "A Public Key Black Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self Defensive Pirates", Asiacrypt 2004, LNCS 3329.