RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      Fully Collusion-Resistant Trace-and-Revoke Scheme in Prime-Order Groups

      한글로보기

      https://www.riss.kr/link?id=A104078356

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to require composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in prime-order groups. Our scheme is fully collusion-resistant and achieves ciphertexts and private keys of size O(√N) for N users. For the same level of security,our scheme is better than the BW scheme in all aspects of effi-ciency. Some superior features include 8.5 times faster encryption,12 times faster decryption, and 3.4 times shorter ciphertexts. To achieve our goal, we introduce a novel technique where, by using asymmetric bilinear maps in prime-order groups, the cancellation effect same as in composite-order groups can be obtained.
      번역하기

      A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. Howev...

      A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to require composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in prime-order groups. Our scheme is fully collusion-resistant and achieves ciphertexts and private keys of size O(√N) for N users. For the same level of security,our scheme is better than the BW scheme in all aspects of effi-ciency. Some superior features include 8.5 times faster encryption,12 times faster decryption, and 3.4 times shorter ciphertexts. To achieve our goal, we introduce a novel technique where, by using asymmetric bilinear maps in prime-order groups, the cancellation effect same as in composite-order groups can be obtained.

      더보기

      참고문헌 (Reference)

      1 G. Ateniese, "Untraceable rfid tags via insubvertible encryption" 92-101, 2005

      2 B. Chor, "Tracing traitors" 257-270, 1994

      3 D. Halevy, "The LSD broadcast encryption scheme" 47-60, 2002

      4 S. D. Galbraith, "Supersingular curves in cryptography" 495-513, 2001

      5 D. Boneh, "Short group signatures" 41-55, 2004

      6 D. Naor, "Revocation and tracing schemes for stateless receivers" 41-62, 2001

      7 Y. Dodis, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 100-115, 2003

      8 J. H. Park, "Public key broadcast encryption schemes with shorter transmissions" IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 54 (54): 411-1, 2008

      9 S. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008

      10 A. Kiayias, "On crafy pirates and foxy tracers" 22-39, 2001

      1 G. Ateniese, "Untraceable rfid tags via insubvertible encryption" 92-101, 2005

      2 B. Chor, "Tracing traitors" 257-270, 1994

      3 D. Halevy, "The LSD broadcast encryption scheme" 47-60, 2002

      4 S. D. Galbraith, "Supersingular curves in cryptography" 495-513, 2001

      5 D. Boneh, "Short group signatures" 41-55, 2004

      6 D. Naor, "Revocation and tracing schemes for stateless receivers" 41-62, 2001

      7 Y. Dodis, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 100-115, 2003

      8 J. H. Park, "Public key broadcast encryption schemes with shorter transmissions" IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC 54 (54): 411-1, 2008

      9 S. Galbraith, "Pairings for cryptographers" 156 (156): 3113-3121, 2008

      10 A. Kiayias, "On crafy pirates and foxy tracers" 22-39, 2001

      11 D. Boneh, "Identity based encryption from the Weil pairing" 213-229, 2001

      12 D. Boneh, "Fully collusion resistant traitor tracing with short ciphertexts and private keys" 573-592, 2006

      13 E. Gahai, "Efficient methods for integrating traceability and broadcast encryption" 372-387, 1999

      14 S. Garg, "Efficient fully collusion-resilient traitor tracing scheme"

      15 M. T. Goodrich, "Effcient tree-based revocation in groups of low-state devices" 511-527, 2004

      16 M. Naor, "Effcient trace and revoke schemes" 1-20, 2000

      17 J. Camenisch, "Compact ecash, Cryptology ePrint Archive, Report"

      18 D. Boneh, "Collusion resistant broadcast encryption with short ciphertexts and private keys" 258-275, 2005

      19 A. Fiat, "Broadcast encryption" 480-491, 1993

      20 M. Scott, "Authenticated id-based key exchange and remote login with simple token and pin number"

      21 L. Ducas, "Anonymity from asymmetry,In New constructions for anonymous HIBE" 148-164, 2010

      22 D. Boneh, "An effcient public key traitor tracing scheme" 338-353, 1999

      23 C. Gentry, "Adaptive security in broadcast encryption systems (with short ciphertexts)" 171-188, 2009

      24 W. Tzeng, "A public key traitor tracing scheme with revocation using dynamic shares" 207-224, 2001

      25 N. McCullagh, "A new two-party identitybased authenticated key agreement" 262-274, 2005

      26 J. H. Park, "A new public key broadcast encryption using Boneh Boyen Goh’s HIBE scheme" 101-115, 2008

      27 D. Boneh, "A fully collusion resistant broadcast, trace, and revoke system" 211-220, 2006

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2005-01-01 평가 SCI 등재 (등재후보1차) KCI등재
      2004-01-01 평가 등재후보학술지 유지 (등재후보2차) KCI등재후보
      2003-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2001-07-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.74 0.09 0.53
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.42 0.34 0.264 0.02
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼