Disclaimer: This page refers to an external person. It only lists all the interactions between this person and the Crypto Group. Validity or accuracy of the following information is thus not guaranteed in any way.
February 09, 2006 - A public key traitor tracing scheme secure against adaptive chosen ciphertext attack
by ChongHee KIM
|Abstract: ||A broadcast encryption scheme enables a center to send encrypted data toa large group of users over an insecure channel, where only legitimate users can decrypt the data. The set of legitimate users is dynamically changing, so it should be possible to prevent some revoked users from decrypting the data. The broadcast encryption scheme has numerous applications, such as pay-TV systems,the distribution of copyrighted materials, internet multicasting of video,music, magazines, and so on. Broadcast encryption schemes can be divided into many categories. Among them, we are mostly interested in public key based schemes. Public key based broadcast encryption schemes are also divided into several categories, such as a traitor tracing scheme, a revoke scheme, a trace and revoke scheme, and so on.
An encryption scheme secure against adaptive chosen ciphertext attack is a very powerful cryptographic primitive. It is essential in designing protocols that are secure against active adversaries. Therefore, we proposed new public key broadcast encryption schemes secure against adaptive chosen ciphertext