On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Aggelos KiayiasSerdar PehlivanogluPublished in: Digital Rights Management Workshop (2009)
Keyphrases
- public key
- private key
- ciphertext
- cca secure
- identity based encryption
- public key encryption
- public key cryptosystem
- proxy re encryption
- security model
- encryption scheme
- security analysis
- public key cryptography
- diffie hellman
- elliptic curve cryptography
- standard model
- authentication scheme
- provably secure
- secure communication
- image authentication
- authentication protocol
- signature scheme
- digital signature
- blind signature
- blind signature scheme
- public key infrastructure
- signcryption scheme
- rfid tags
- security requirements
- secret key
- secret sharing scheme
- image encryption
- information security
- encryption algorithm
- key distribution
- security properties
- hash functions
- chosen ciphertext
- digital images