Abstract
In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.
| Original language | English |
|---|---|
| Title of host publication | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
| Editors | Kurt Bauknecht, A. Min Tjoa, Gerald Quirchmayr |
| Publisher | Springer Verlag |
| Pages | 104-114 |
| Number of pages | 11 |
| ISBN (Print) | 3540408088, 9783540408086 |
| Publication status | Published - 2003 |
| Event | 4th International Conference on E-Commerce and Web Technology, EC-Web 2003 - Prague, Czech Republic Duration: 2003 Sept 2 → 2003 Sept 5 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 2738 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Other
| Other | 4th International Conference on E-Commerce and Web Technology, EC-Web 2003 |
|---|---|
| Country/Territory | Czech Republic |
| City | Prague |
| Period | 03/9/2 → 03/9/5 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2003.
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'An anonymous asymmetric public key traitor tracing scheme'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS