DOI QR코드

DOI QR Code

Efficient Public-Key Traitor Tracing with Unlimited Revocation Capability

무제한 사용자 탈퇴를 제공하는 효율적으로 공모자 추적 기법

  • 김현정 (고려대학교 정보보호연구센터) ;
  • 임종인 (고려대학교 정보보호연구센터) ;
  • 이동훈 (고려대학교 정보보호연구센터)
  • Published : 2001.10.01

Abstract

Two important requirements in broadcast encryption schemes are traitor traceability and revocability. In this paper, we propose a new type of a traitor tracing scheme that can revoke an unlimited number of traitors\` personal keys. Additionally, we propose an efficient and simple method to provide self-enforcement property. We also describe a variant of our scheme of which encryption algorithm is secure against adaptive chosen ciphertext attacks.

브로드캐스트 암호화 기법에는 두 가지 중요한 요구사항이 있다. 하나는 공모자 추적 가능성이며 다른 하나는 추적된 공모자의 탈퇴 가능성이다. 이 논문에서는 공모자의 권한을 박탈하는데 있어서 그 인원수가 제한되지 않는 새로운 형태의 공모자 추적 기법을 제안하고자 한다. 더불어 좀 더 효율적이고 간단한 자기 방지 기법에 대해 소개한다. 또한 제안한 암호화 기법을 변형하여 적응-선택 암호문 공격에 안전한 방법을 구현한다.

Keywords

References

  1. Proc.Advances in Cryptology -Asiacrypt'99.of Lecture Notes in Computer Science v.1716 A Quick Group Key Distribution Scheme with Entity Revocation J.Anzai;N.Matsuzaki;T.Matsumoto
  2. Proc.Advances in Cryptology-Crypto'99.of Lecture Notes in Computer Science v.1666 An Efficient Public Key Traitor Tracing Scheme D.Boneh;M.Franklin
  3. Proc.Advances in Cryptology-Crypto'99.of Lecture Notes in Computer Science v.839 Tracing Traitors B.Chor;A.Fiat;M.Naor
  4. 28th Symposium on the Theory of Computation'96 Digital Signets: Self-Enforcing Protection of Digital Imfromation C.Dwork;J.Lotspiech;M.Naor
  5. Proc.Advances in Cryptology-Eurocrypt'98.of Lecture Notes in Computer Science v.1403 Optimum Traitor Tracing and Asymmetric Schemes K.Kurosawa;Y.Desmedt
  6. Handbook of Applied Cryptography A.J.Menezes;P.C.van Oorschot;S.A.Vanstone
  7. Proc.Finalcial Cryptography'00.Anguilla. Efficient Trace and Revoke Schemes M.Naor;B.Pinkas
  8. International Worshop on Practice and Theory in Public-Key Cryptography-RKC'01.of Lecture Notes in Computer Science v.1992 The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes T.Okamoto;D.Pointcheval
  9. The Cryptographers'Tranck of the RSA Conference '2001.of Lecture Notes in Computer Science v.2020 REACT:Rapid Enhanced-security Asymmetric Cryptosystem Transform T.Okamoto;D.Pointcheval
  10. Proc.Workshop in Information Hiding.of Lecture Notes in Computer Science v.1174 Trials of Traced Traitors B.Pfitzmann
  11. Comm ACM v.22 no.11 How to Share a Secret A.Shamir
  12. Cryptography Theory and Practice D.R.Stinson
  13. International Workshop on Practice and Theory in Public-Key Cryptography-PKC'01.of Lecture Notes in Computer Science v.1992 A Public-Key Traitor Tracing Scheme with Revocation using Dynamic Shares W.Tzeng;Z.J.Tzeng