Identity-based traitor tracing

Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in the asymmetric bilinear pairing setting, and that the DDH assumption holds in the group defining the first coordinate of the asymmetric pairing. Our traitor tracing system allows adaptive pirates to be traced. The scheme makes use of a two level identity-based encryption scheme with wildcards (WIBE) based on Waters' identity-based encryption scheme.

Original languageEnglish
Title of host publicationPublic Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
PublisherSpringer Verlag
Pages361-376
Number of pages16
ISBN (Print)9783540716761
DOIs
Publication statusPublished - 1 Jan 2007
Externally publishedYes
Event10th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2007 - Beijing, China
Duration: 16 Apr 200720 Apr 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4450 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2007
Country/TerritoryChina
CityBeijing
Period16/04/0720/04/07

Fingerprint

Dive into the research topics of 'Identity-based traitor tracing'. Together they form a unique fingerprint.

Cite this