We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming thebilinear decision Diffie-Hellman (DBDH) % and the new augmented% bilinear computational Diffie-Hellman (ABCD) problems areis hard in the asymmetric bilinear pairing setting, and that the DDHassumption holds in the group defining the first coordinate of theasymmetric pairing. Our traitor tracing system allows adaptivepirates to be traced. The scheme makes use of a two levelidentity-based encryption scheme with wildcards (WIBE) based onWaters' identity-based encryption scheme.
|Translated title of the contribution||Identity-based traitor tracing|
|Title of host publication||Public Key Cryptography - PKC 2007|
|Publisher||Springer Berlin Heidelberg|
|Publication status||Published - 2007|
Bibliographical noteOther page information: 361-367
Conference Proceedings/Title of Journal: Proc. PKC 2007
Other identifier: 2000737