• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2000 Fiscal Year Final Research Report Summary

A Study on Traceable Broadcast Encryption Schemes

Research Project

Project/Area Number 11680348
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field 計算機科学
Research InstitutionTokyo Institute of Technology

Principal Investigator

KAORU Kurosawa  Graduate Schoole of Science and Enginnering, Tokyo Institute of Technology, Professor, 大学院・理工学研究科, 教授 (60153409)

Project Period (FY) 1999 – 2000
KeywordsCryptography / Broadcast Encryption / Traitor Tracing / 追跡可能暗号系
Research Abstract

In many systems which distribute messages to authorized users over a broadcast channel, a data supplier T gives each authorized user a personal decryption key. However, some malicious authorized users (traitors) may create a pirate key and give it to a pirate (an un-authorized user). A (k, n)-traceability scheme is a scheme in which at least one traitor is detected from a pirate key if there are at most k traitors among n authorized users. Kurosawa and Desmedt found lower bounds on the size of keys and the size of ciphertexts of traceability schemes. They also proposed a scheme which meets these bounds. However, Stinson and Wei showed a linear attack.
This research first presented a proven secure tracing algorithm for the KD scheme. It will trace not only the traitors who use the Stinson-Wei attack but also any traitors.
On the other hand, it is often desirable for the center to be able to exclude certain users from recovering the message that is broadcast in encrypted form. We say that a broadcast encryption scheme is a (c, N)-Broadcast Exclusion Scheme ((c, N )-BEX) if a center can exclude any c or less users among N users. This research next showed that a (c, N)-BEX is obtained from a cover free family. It also showed a new construction of cover free families using almost strongly universal hash function families such that overhead=O(c^2). This scheme has good tracebaility as well.

  • Research Products

    (4 results)

All Other

All Publications (4 results)

  • [Publications] Kurosawa,Desmedt,Burnester: "The failure of the Boneh-Franklin/stinson-Wei attack"DIMACS workshop. (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Kurosawa,Yoshida,Desmedt: "Inherently large traceability of broadcast encryption scheme "Proc.of LSIT. 464 (2000)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] K.Kurosawa, Y.Desmedt and M.Burmester: "The failure of Boneh-Franklin/Stinson-Wei attac"DIMACS workshop. (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] K.Kurosawa, T.Yoshida and Y.Desmedt: "Inherently Large Traceability of Broadcast Encryption Scheme"Proc.of ISIT'2000. 464 (2000)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2002-03-26  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi