Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
Kazuto OgawaGoichiro HanaokaHideki ImaiPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2007)
Keyphrases
- secure communication
- private key
- digital tv
- authentication scheme
- encryption key
- public key
- key distribution
- high security
- diffie hellman
- security analysis
- secret sharing scheme
- secret sharing
- public key encryption
- end users
- digital signature scheme
- trusted third party
- security protocols
- service oriented
- management system
- standard model
- service quality
- protection scheme
- smart card
- service providers
- group communication
- key management
- security requirements
- provably secure
- electronic voting