Title
An intelligent and efficient traitor tracing for ubiquitous environments
Abstract
Broadcast encryption has been applied to transmit digital information such as multimedia, software and paid TV programs on the open networks. One of key factors in the broadcast encryption is that only previously authorized users can access the digital information. If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user will get the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users’ malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive scheme for each user to have effective and intelligence renewal cycle to generate keys.
Year
DOI
Venue
2006
10.1007/11893004_101
KES (2)
Keywords
Field
DocType
personal key,efficient traitor,digital information,effective way,session key,privileged user,broadcast encryption,effective process,tv program,key factor,ubiquitous environment,broadcast message
Broadcast encryption,Cryptography,Computer security,Computer science,Information access,Ubiquitous computing,Multicast,Traitor tracing,Session key,Tracing
Conference
ISBN
Citations 
PageRank 
3-540-46537-5
0
0.34
References 
Authors
11
3
Name
Order
Citations
PageRank
Deokgyu Lee16112.70
Seo-Il Kang292.07
Im-Yeong Lee314724.59