A Secure Traitor Tracing Scheme against Key Exposure
Kazuto OgawaGoichiro HanaokaHideki ImaiPublished in: CoRR (2005)
Keyphrases
- secure communication
- private key
- authentication scheme
- encryption key
- security analysis
- high security
- key distribution
- public key
- secret sharing
- digital signature scheme
- key management
- protection schemes
- public key encryption
- secret key
- provably secure
- key exchange
- security model
- standard model
- signature scheme
- smart card
- key establishment
- security properties
- authentication mechanism
- diffie hellman
- motion estimation
- security protocols
- security requirements
- fine grained