Computer Science ›› 2011, Vol. 38 ›› Issue (2): 106-109.

Previous Articles     Next Articles

Public Traceable Traitor Tracing Scheme Secure against CCA2

WANG Qing-long,ZHANG Shao-bo   

  • Online:2018-11-16 Published:2018-11-16

Abstract: A new k-resilient publi}key traitor tracing scheme was proposed. A traitor in this scheme can be traced by the way of public black-box tracing mean. Meanwhile, our scheme is provably secure against adaptive chosen ciphertext attack assume that DDH problem is difficulty. Our scheme remains CCA2-secure when not more than k traitors arc reyoked. Compared with similar schemes,our scheme does not use one-time message authentication code assumption and reduces the tracing complexity greatly. Further, our scheme satisfies asymmetry.

Key words: Traitor tracing, Broadcast encryption, MAC, Provable security, Asymmetry

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!