@inproceedings{caf7a47ebc424983a7791b353272bdaa,
title = "Identity-based traitor tracing",
abstract = "We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters' identity-based encryption scheme.",
author = "Michel Abdalla and Dent, \{Alexander W.\} and John Malone-Lee and Gregory Neven and Phan, \{Duong Hieu\} and Smart, \{Nigel P.\}",
year = "2007",
month = jan,
day = "1",
doi = "10.1007/978-3-540-71677-8\_24",
language = "English",
isbn = "9783540716761",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "361--376",
booktitle = "Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings",
note = "10th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2007 ; Conference date: 16-04-2007 Through 20-04-2007",
}