A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
Tatsuyuki MatsushitaHideki ImaiPublished in: ASIACRYPT (2004)
Keyphrases
- black box
- public key
- ciphertext
- proxy re encryption
- public key encryption
- private key
- cca secure
- identity based encryption
- standard model
- security analysis
- security model
- encryption scheme
- public key cryptography
- public key cryptosystem
- diffie hellman
- authentication scheme
- secure communication
- secret key
- provably secure
- signature scheme
- authentication protocol
- digital signature
- keyword search
- blind signature scheme
- blind signature
- key distribution
- test cases
- signcryption scheme
- relational databases
- hash functions