E-mail

E-mail a Wiley Online Library Link

Tsu-Yang Wu and Yuh-Min Tseng Further analysis of pairing-based traitor tracing schemes for broadcast encryption Security and Communication Networks 6

Version of Record online: 24 FEB 2012 | DOI: 10.1002/sec.522

Thumbnail image of graphical abstract

In this paper, we present a security claim for the design of pairing-based traitor tracing schemes. For a pairing-based traitor tracing scheme with constant size ciphertexts and private keys, if the decryption key is obtained by some pairing operations in pairing-based public key systems, the scheme will suffer from a linear attack and cannot provide the traitor tracing functionality.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH