• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A Study on Traceable Broadcast Encryption Schemes

Research Project

Project/Area Number 11680348
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field 計算機科学
Research InstitutionTokyo Institute of Technology

Principal Investigator

KAORU Kurosawa  Graduate Schoole of Science and Enginnering, Tokyo Institute of Technology, Professor, 大学院・理工学研究科, 教授 (60153409)

Project Period (FY) 1999 – 2000
Project Status Completed (Fiscal Year 2000)
Budget Amount *help
¥1,500,000 (Direct Cost: ¥1,500,000)
Fiscal Year 2000: ¥600,000 (Direct Cost: ¥600,000)
Fiscal Year 1999: ¥900,000 (Direct Cost: ¥900,000)
KeywordsCryptography / Broadcast Encryption / Traitor Tracing / 追跡可能暗号系
Research Abstract

In many systems which distribute messages to authorized users over a broadcast channel, a data supplier T gives each authorized user a personal decryption key. However, some malicious authorized users (traitors) may create a pirate key and give it to a pirate (an un-authorized user). A (k, n)-traceability scheme is a scheme in which at least one traitor is detected from a pirate key if there are at most k traitors among n authorized users. Kurosawa and Desmedt found lower bounds on the size of keys and the size of ciphertexts of traceability schemes. They also proposed a scheme which meets these bounds. However, Stinson and Wei showed a linear attack.
This research first presented a proven secure tracing algorithm for the KD scheme. It will trace not only the traitors who use the Stinson-Wei attack but also any traitors.
On the other hand, it is often desirable for the center to be able to exclude certain users from recovering the message that is broadcast in encrypted form. We say that a broadcast encryption scheme is a (c, N)-Broadcast Exclusion Scheme ((c, N )-BEX) if a center can exclude any c or less users among N users. This research next showed that a (c, N)-BEX is obtained from a cover free family. It also showed a new construction of cover free families using almost strongly universal hash function families such that overhead=O(c^2). This scheme has good tracebaility as well.

Report

(3 results)
  • 2000 Annual Research Report   Final Research Report Summary
  • 1999 Annual Research Report
  • Research Products

    (6 results)

All Other

All Publications (6 results)

  • [Publications] Kurosawa,Desmedt,Burnester: "The failure of the Boneh-Franklin/stinson-Wei attack"DIMACS workshop. (2000)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2000 Final Research Report Summary
  • [Publications] Kurosawa,Yoshida,Desmedt: "Inherently large traceability of broadcast encryption scheme "Proc.of LSIT. 464 (2000)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2000 Final Research Report Summary
  • [Publications] K.Kurosawa, Y.Desmedt and M.Burmester: "The failure of Boneh-Franklin/Stinson-Wei attac"DIMACS workshop. (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2000 Final Research Report Summary
  • [Publications] K.Kurosawa, T.Yoshida and Y.Desmedt: "Inherently Large Traceability of Broadcast Encryption Scheme"Proc.of ISIT'2000. 464 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2000 Final Research Report Summary
  • [Publications] Kurosawa,Yoshida,Desmedt: "Inherently large traceability of broadcast encryption scheme."Proc of LSLT. 464 (2000)

    • Related Report
      2000 Annual Research Report
  • [Publications] Kurosawa,Desmedt,Burmester: "The Failare of the Boneh-Franklin/Stinson-Wei attach"DIMACS workshop. (2000)

    • Related Report
      1999 Annual Research Report

URL: 

Published: 1999-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi