{"id":"https://openalex.org/W2075241642","doi":"https://doi.org/10.1145/1655048.1655050","title":"On the security of a public-key traitor tracing scheme with sublinear ciphertext size","display_name":"On the security of a public-key traitor tracing scheme with sublinear ciphertext size","publication_year":2009,"publication_date":"2009-11-09","ids":{"openalex":"https://openalex.org/W2075241642","doi":"https://doi.org/10.1145/1655048.1655050","mag":"2075241642"},"language":"en","primary_location":{"id":"doi:10.1145/1655048.1655050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655048.1655050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the nineth ACM workshop on Digital rights management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073753740","display_name":"Aggelos Kiayias","orcid":"https://orcid.org/0000-0003-2451-1430"},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aggelos Kiayias","raw_affiliation_strings":["University of Connecticut, Storrs, CT, USA","University of Connecticut, Storrs, CT USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Connecticut, Storrs, CT, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"University of Connecticut, Storrs, CT USA#TAB#","institution_ids":["https://openalex.org/I140172145"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019256883","display_name":"Serdar Pehlivano\u011flu","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Serdar Pehlivanoglu","raw_affiliation_strings":["University of Connecticut, Storrs, CT, USA","University of Connecticut, Storrs, CT USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Connecticut, Storrs, CT, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"University of Connecticut, Storrs, CT USA#TAB#","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073753740"],"corresponding_institution_ids":["https://openalex.org/I140172145"],"apc_list":null,"apc_paid":null,"fwci":1.9414,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87480335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traitor-tracing","display_name":"Traitor tracing","score":0.9694927930831909},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.725629448890686},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7105072736740112},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6619510054588318},{"id":"https://openalex.org/keywords/sublinear-function","display_name":"Sublinear function","score":0.5105446577072144},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4292389452457428},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4244718551635742},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41469791531562805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40571728348731995},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34805089235305786},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22774666547775269},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1769157350063324}],"concepts":[{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.9694927930831909},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.725629448890686},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7105072736740112},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6619510054588318},{"id":"https://openalex.org/C117160843","wikidata":"https://www.wikidata.org/wiki/Q338652","display_name":"Sublinear function","level":2,"score":0.5105446577072144},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4292389452457428},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4244718551635742},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41469791531562805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40571728348731995},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34805089235305786},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22774666547775269},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1769157350063324},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1655048.1655050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655048.1655050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the nineth ACM workshop on Digital rights management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5199999809265137,"display_name":"Reduced inequalities"},{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1495266644","https://openalex.org/W1522268755","https://openalex.org/W1535174999","https://openalex.org/W1540545270","https://openalex.org/W1541829396","https://openalex.org/W1560252361","https://openalex.org/W1561762905","https://openalex.org/W1594802052","https://openalex.org/W1605382226","https://openalex.org/W2062287255","https://openalex.org/W2168571148","https://openalex.org/W2561675875","https://openalex.org/W2911546054","https://openalex.org/W4285719527","https://openalex.org/W6639181382"],"related_works":["https://openalex.org/W1561762905","https://openalex.org/W2613516814","https://openalex.org/W2989083936","https://openalex.org/W2109661373","https://openalex.org/W1510640641","https://openalex.org/W2140065445","https://openalex.org/W3196755287","https://openalex.org/W2555433399","https://openalex.org/W2366712519","https://openalex.org/W2351957531"],"abstract_inverted_index":{"Traitor":[0],"tracing":[1,48,65,76,125,169,240],"refers":[2],"to":[3,13,18,53,94,114,153,162,182,208],"a":[4,19,28,33,47,151,154,163,206,231],"class":[5],"of":[6,35,58,75,87,134,156,187,197],"encryption":[7],"schemes":[8],"that":[9,21,67,80,90,109,121,145,158,234,254],"can":[10,149,159],"be":[11,92,160],"used":[12],"deter":[14],"key-leakage.":[15],"They":[16],"apply":[17],"setting":[20],"involves":[22],"many":[23],"receivers,":[24],"each":[25],"one":[26,57],"receiving":[27],"fingerprinted":[29],"decryption":[30],"key.":[31],"If":[32],"set":[34,155],"malicious":[36],"receivers":[37],"(also":[38],"known":[39],"as":[40,184,212,214],"traitors)":[41],"constructs":[42],"an":[43,51,115,118,135,146,191],"illicit":[44,78,119,147,252],"decoder":[45,120,148],"then":[46],"mechanism":[49,89,233],"enables":[50],"authority":[52],"identify":[54],"at":[55],"least":[56],"the":[59,132,143,178,185,195,210,215,224,236,239,243,247],"traitors.":[60,198],"The":[61,174],"very":[62],"first":[63],"traitor":[64],"scheme":[66,111],"has":[68],"sublinear":[69],"ciphertext":[70,152],"size":[71],"and":[72,103,170,242,249],"is":[73,112,140],"capable":[74],"unambiguously":[77],"decoders":[79,253],"may":[81],"shut-down":[82],"(or":[83],"employ":[84],"some":[85],"sort":[86],"self-defensive":[88],"would":[91],"adverse":[93],"tracing)":[95],"was":[96],"proposed":[97],"in":[98,131,194,223,246],"AsiaCrypt":[99],"2004":[100],"by":[101,117],"Matsushita":[102],"Imai.In":[104],"this":[105,110],"work":[106],"we":[107,203,229],"demonstrate":[108],"susceptible":[113],"attack":[116,139,202],"not":[122,218],"only":[123],"evades":[124],"but":[126],"results":[127],"with":[128,190,257],"high":[129,259],"likelihood":[130],"incrimination":[133],"innocent":[136],"user.":[137],"Our":[138],"based":[141],"on":[142],"fact":[144],"decompose":[150],"components":[157],"submitted":[161],"statistical":[164,175],"test":[165],"which":[166],"distinguishes":[167],"between":[168,177,238],"regular":[171,244],"system":[172,248],"operation.":[173],"distance":[176],"two":[179],"distributions":[180],"converges":[181],"1":[183],"number":[186,196],"traitors":[188,216],"grows":[189],"exponential":[192],"rate":[193],"After":[199],"demonstrating":[200],"our":[201],"also":[204],"present":[205],"way":[207],"repair":[209],"construction":[211],"long":[213],"are":[217,255],"spaced":[219],"too":[220],"far":[221],"apart":[222],"user":[225],"population.":[226],"In":[227],"particular":[228],"devise":[230],"transmission":[232],"eliminates":[235],"discrepancies":[237],"operation":[241,245],"works":[250],"against":[251],"correct":[256],"sufficiently":[258],"probability.":[260]},"counts_by_year":[{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
