學術產出-會議論文
題名 | ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications |
作者 | 孫士勝;曾一凡 Tseng, Yi-Fan;Tso, Raylin;Sun, Shi-Sheng;Liu, Zi-Yuan;Chen, You-Qian |
貢獻者 | 資訊系 |
關鍵詞 | Traitor Tracing; Black-Box; ID-Based Encryption; Relaxed Black-Box |
日期 | 2024-08 |
上傳時間 | 7-一月-2025 09:35:49 (UTC+8) |
摘要 | The rise of streaming platforms has underscored the importance of traitor tracing technology in safeguarding digital content from unauthorized distribution. Traitor tracing serves as a crucial tool for enhancing content piracy by tracing the sources of leaked or illicitly distributed content. This paper focuses on the issue of ID-based traitor tracing, utilizing a relaxed black-box approach to achieve trace efficiency similar to white-box tracing, while maintaining the feasibility of black-box setting in practice. Two schemes are proposed in this work, each proven secure under the DBDH assumption. Additionally, the proposed schemes also support group-based services. Compared to existing related works, our schemes offer efficient tracing and support for group-based services and applications in the streaming platform era, highlighting the importance of traitor tracing. |
關聯 | 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), NCKU & CCISA |
資料類型 | conference |
DOI | https://doi.org/10.1109/AsiaJCIS64263.2024.00016 |
dc.contributor | 資訊系 | |
dc.creator (作者) | 孫士勝;曾一凡 | |
dc.creator (作者) | Tseng, Yi-Fan;Tso, Raylin;Sun, Shi-Sheng;Liu, Zi-Yuan;Chen, You-Qian | |
dc.date (日期) | 2024-08 | |
dc.date.accessioned | 7-一月-2025 09:35:49 (UTC+8) | - |
dc.date.available | 7-一月-2025 09:35:49 (UTC+8) | - |
dc.date.issued (上傳時間) | 7-一月-2025 09:35:49 (UTC+8) | - |
dc.identifier.uri (URI) | https://nccur.lib.nccu.edu.tw/handle/140.119/155066 | - |
dc.description.abstract (摘要) | The rise of streaming platforms has underscored the importance of traitor tracing technology in safeguarding digital content from unauthorized distribution. Traitor tracing serves as a crucial tool for enhancing content piracy by tracing the sources of leaked or illicitly distributed content. This paper focuses on the issue of ID-based traitor tracing, utilizing a relaxed black-box approach to achieve trace efficiency similar to white-box tracing, while maintaining the feasibility of black-box setting in practice. Two schemes are proposed in this work, each proven secure under the DBDH assumption. Additionally, the proposed schemes also support group-based services. Compared to existing related works, our schemes offer efficient tracing and support for group-based services and applications in the streaming platform era, highlighting the importance of traitor tracing. | |
dc.format.extent | 112 bytes | - |
dc.format.mimetype | text/html | - |
dc.relation (關聯) | 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), NCKU & CCISA | |
dc.subject (關鍵詞) | Traitor Tracing; Black-Box; ID-Based Encryption; Relaxed Black-Box | |
dc.title (題名) | ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications | |
dc.type (資料類型) | conference | |
dc.identifier.doi (DOI) | 10.1109/AsiaJCIS64263.2024.00016 | |
dc.doi.uri (DOI) | https://doi.org/10.1109/AsiaJCIS64263.2024.00016 |