How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
Kazuto OgawaGoichiro HanaokaHideki ImaiPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2017)
Keyphrases
- key agreement
- service providers
- service oriented
- service composition
- content management
- identity management
- key management
- security measures
- trust relationships
- electronic payment
- key management scheme
- key exchange protocol
- content providers
- countermeasures
- authentication mechanism
- security services
- multimedia
- web services
- public key encryption
- security risks
- cost efficient
- digital objects
- mobile payment
- key agreement protocol
- block cipher
- computing environments
- end users