An anonymous asymmetric public key traitor tracing scheme

Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    EditorsKurt Bauknecht, A. Min Tjoa, Gerald Quirchmayr
    PublisherSpringer Verlag
    Pages104-114
    Number of pages11
    ISBN (Print)3540408088, 9783540408086
    Publication statusPublished - 2003
    Event4th International Conference on E-Commerce and Web Technology, EC-Web 2003 - Prague, Czech Republic
    Duration: 2003 Sept 22003 Sept 5

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2738
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other4th International Conference on E-Commerce and Web Technology, EC-Web 2003
    Country/TerritoryCzech Republic
    CityPrague
    Period03/9/203/9/5

    Bibliographical note

    Publisher Copyright:
    © Springer-Verlag Berlin Heidelberg 2003.

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'An anonymous asymmetric public key traitor tracing scheme'. Together they form a unique fingerprint.

    Cite this