J. KIMS Technol Search

CLOSE


J. KIMS Technol > Volume 15(1); 2012 > Article
Journal of the Korea Institute of Military Science and Technology 2012;15(1):46-56.
DOI: https://doi.org/10.9766/KIMST.2012.15.1.046   
A Public Key Traitor Tracing Scheme with Key-update Method
Moon-Shik Lee
Korea Air Force Academy
개인키 업데이트가 가능한 공개키 기반 공모자 추적 암호 알고리즘
이문식
공군사관학교 수학과
Abstract
Traitor Tracing schemes are broadcast encryption systems where at least one of the traitors who were implicated in the construction of a pirate decoder can be traced. This traceability is required in various contents delivery system like satellite broadcast, DMB, pay-TV, DVD and so on. In this paper, we propose a public key traitor tracing scheme with key-update method. If the system manager can update a secret key which is stored in an authorized decode, it makes a pirate decoder useless by updating a secret key A pirate decoder which cannot update a secret key does not decrypt contents in next session or during tracing a traitor, this scheme has merits which will make a pirate decoder useless, therefore this scheme raises the security to a higher level.
Key Words: Cryptography, Broadcast Encryption System, Traitor Tracing, Traitor Trace and Revoke, Key-update
TOOLS
Share :
Facebook Twitter Linked In Google+ Line it
METRICS Graph View
  • 0 Crossref
  •    
  • 585 View
  • 0 Download
Related articles in J. KIMS Technol.


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2024 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next