Identity-based traitor tracing

Michel Abdalla, Alexander Dent, John Malone-Lee, Gregory Neven, Phan D.H., Nigel Smart

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

28 Citations (Scopus)

Abstract

We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming thebilinear decision Diffie-Hellman (DBDH) % and the new augmented% bilinear computational Diffie-Hellman (ABCD) problems areis hard in the asymmetric bilinear pairing setting, and that the DDHassumption holds in the group defining the first coordinate of theasymmetric pairing. Our traitor tracing system allows adaptivepirates to be traced. The scheme makes use of a two levelidentity-based encryption scheme with wildcards (WIBE) based onWaters' identity-based encryption scheme.
Translated title of the contributionIdentity-based traitor tracing
Original languageEnglish
Title of host publicationPublic Key Cryptography - PKC 2007
PublisherSpringer Berlin Heidelberg
Pages361-367
Volume4450
Publication statusPublished - 2007

Bibliographical note

Other page information: 361-367
Conference Proceedings/Title of Journal: Proc. PKC 2007
Other identifier: 2000737

Fingerprint Dive into the research topics of 'Identity-based traitor tracing'. Together they form a unique fingerprint.

Cite this