Recently, we proposed new crypto systems such as ID based key-sharing scheme or traitor tracing scheme with Well paring. In this paper we introduce the traitor tracing scheme published in IEICE2002 and discuss the extent of the security, compared with the OSK-IDNIKS under the collusion attack.
展开▼