2006
DOI: 10.1007/11761679_34
|View full text |Cite
|
Sign up to set email alerts
|

Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys

Abstract: We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generates ciphertexts of size O( √ N ) and private keys of size O(1). We first introduce a simpler primitive we call private linear broadcast encryption (PLBE) and show that any PLBE gives a tracing traitors system with the same parameters. We then show how to build a PLBE system with O( √ N ) size ciphertexts. Our system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
268
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 228 publications
(269 citation statements)
references
References 35 publications
0
268
0
1
Order By: Relevance
“…These include GrothOstrovsky-Sahai proofs [22,21], the Boneh-Sahai-Waters traitor tracing scheme [10,15], and the functional encryption schemes of Lewko-Okamoto-Sahai-Takashima-Waters [25,33]. Waters also notes that the dual system encryption techniques in [39] used to obtain prime order systems were first instantiated in composite order groups.…”
Section: Introductionmentioning
confidence: 99%
“…These include GrothOstrovsky-Sahai proofs [22,21], the Boneh-Sahai-Waters traitor tracing scheme [10,15], and the functional encryption schemes of Lewko-Okamoto-Sahai-Takashima-Waters [25,33]. Waters also notes that the dual system encryption techniques in [39] used to obtain prime order systems were first instantiated in composite order groups.…”
Section: Introductionmentioning
confidence: 99%
“…Many traitor tracing schemes were designed to be secure against a collusion of t users. Fully collusion resistant traitor tracing schemes were proposed based on bilinear groups [6,15,25]. Abdalla et al [1] proposed the concept of identity-based traitor tracing (IBTT) and constructed an IBTT scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The PKBE scheme of Dodis and Fazio [11] can also be a PKTR scheme since their scheme also follows the subset cover framework. Boneh and Waters [7] proposed a fully collusion resistant PKTR scheme based on composite order bilinear groups and proved its adaptive security by combining the PKBE scheme of Boneh et al [5] and the traitor tracing scheme of Boneh et al [6]. The efficiency of this scheme was improved by using prime order bilinear groups [15,26].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations