期刊文献+

基于安全多方计算的数字作品所有权证明(英文) 被引量:3

Ownership Proofs of Digital Works Based on Secure Multiparty Computation
下载PDF
导出
摘要 数字作品的所有权证明允许在不泄漏任何秘密信息和防止所有者欺骗的前提下,对版权声明进行验证.提出一种基于Proactive可验证秘密共享和安全多方计算的数字作品所有权证明方案.在该方案中,可验证秘密共享,保证了所有权秘密的正确性,并防止对协议参与者的欺骗.通过Proactive安全提供自动恢复功能来保证协议生存周期内秘密的完整性和安全性.使用安全多方计算和同态承诺的零知识证明,实现了所有权验证.在不假设可信方存在的前提下,所提出方案能够在没有太多成员合谋的情况下,完成有效计算并发现不忠实成员. Ownership proofs of digital works allow to justify the copyright claim to the buyers without revealing any secret information and prevent the owner from deceiving without the assumption of the trus ted individual. This paper proposes an ownership proofs scheme for digital works based on proactive verifiable secret sharing and secure multiparty computation. In the proposed scheme, verifiable secret sharing ensures the correctness of ownership secrets and achieves security against cheating participants. Proactive security provides an automatic recovery feature to maintain the integrity and security of secret throughout the lifetime of the scheme. Furthermore, the ownership verification is implemented by using secure multiparty computation and zero-knowledge proofs with homomorphic commitments. Without the assumption of the existence of a trusted individual, the proposed scheme can provide effective computation and discover the dishonesty if not too many individuals collude.
出处 《软件学报》 EI CSCD 北大核心 2006年第1期157-166,共10页 Journal of Software
关键词 所有者证明 安全多方计算 前向秘密共享 承诺协议 数字水印 ownership proof secure multiparty computation proactive secret sharing commitment scheme digital watermarking
  • 相关文献

参考文献10

  • 1Adelsbach A, Pfitzmann B, Sadcghi AR. Provingownership of digital content. In: Pfitzmann B, cd, Proc. of the Information Hiding:The 3rd Int'l Workshop. Berlin: Springer-Verlag, 2000. 126-141.
  • 2Adelsbach A, Sadeghi AR. Zero-Knowledge watermark detection and proof of ownership. In: Moskowitz IS, ed. Proc. of the Information Hiding: The 4th Int'l Workshop. Berlin: Springer-Verlag, 2001. 273-288.
  • 3Guo H, Georganas ND. A novel approach to digital image watermarking based on a generalizedsecret sharing scheme. In:Dittmann J, Katzenbeisser S, eds, Proc. of the ACM/Springer Multimedia Systems New York: Springer-Verlag, 2003. 249-260.
  • 4Pedersen TP. Non-Interactive and information theoretic secure verifiable secret sharing. In: Feigenbaum J, ed. Advances in Cryptology (CRYPTO'91). New York: Springer-Verlag, 1991. 129-140.
  • 5Hirt M, Maurer U, Przydatek B. Efficient secure multi-party computation. In: Okamoto T, ed. Advances in Cryptology (ASIACRYPT 2000). New York: Springer-Verlag, 2000. 143-161.
  • 6Gennaro R, Rabin MO, Rabin T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proc. of the ACM Symp, on Principles of Distributed Computing (PODC) 1998.101-111.
  • 7Herzberg A, Jarechi S, Krawczyk H, Yung M. Proactive secret or: How to cope with perpetual leakage. In: Coppersmith D, ed.Advances in Cryptology (CRYPTO'95).New York: Springer-Verlag, 1995. 339-352.
  • 8Fujisaki E, Okamoto T. Statistical zero-knowledge protocols to prove modular polynomial relations. In: Burton S, Jr Kaliski,eds.Advances in Cryptology (Crypto'97). New York: Springer-Verlag, 1997. 16-30.
  • 9Chor B, Goldwasser S, Micali S, Awerbuch B, Verifiable secret sharing and achieving simultaneity in the presence of faults. In:Proc. of the 26th IEEE Symp. on Foundations of Computer Science (FOCS'85) New York: IEEE Press, 1985. 383-395.
  • 10Boudot F. Efficient proofs that a committed number lies in an interval. In: Ellis R, ed. Advances in Cryptology (EUROCRYPT 2000). Berlin: Springer-Verlag, 2000, 431-444.

同被引文献7

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部