期刊文献+

两个叛逆者追踪方案的密码学分析 被引量:1

Cryptanalysis of Two Traitor Tracing Schemes
下载PDF
导出
摘要 文章对马华等人基于RSA加密算法的叛逆者追踪方案进行分析后,发现该方案存在一个明显的漏洞,并引入随机数解决了存在的问题。通过对何新华等人基于离散对数困难问题的无废除门限的公钥叛逆者追踪方案的分析,发现该方案实际上仍受到废除门限的限制,也就是被撤消的用户数仍不能超过废除门限。 Ma Hua et al's traitor tracing scheme based on RSA is analyzed,an obvious bug in which is found,and the problem is solved by introducing a random number.He Xinhua et al's public key traitor tracing scheme based on discrete logarithm problem is analyzed,the scheme is actually limited by the revocable threshold,which means the total number of revocable users can not surpass the revocable threshold.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第15期1-3,61,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60372046) 华为基金资助项目(编号:YSCB2005037NP)
关键词 叛逆者追踪 密码学分析 废除门限 traitor tracing,cryptanalysis,revocable threshold
  • 相关文献

参考文献6

二级参考文献25

  • 1Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. CRYPTO 1999[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 2Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advances in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 3Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[A]. ACM Workshop on Digital Rights Managements[C]. Berlin: Springer-Verlag, 2002. 207-224.
  • 4Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Tracing and Asymmetric Schemes[A]. EUROCRYPT 1998[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 5Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[A]. PKC 2001[C]. Berlin: Springer-Verlag, 2001. 207-224.
  • 6Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[A]. CT-RSA 2001[C]. Berlin: Springer-Verlag, 2001. 392-407.
  • 7B Chor,A Fiat,M Nor. Tracing traitor[C].In:Advance in CryptologyCRYPTO′94, Berlin: Springer-Verlag, 1994: 257~270.
  • 8K Kurasawa,Y Desmedt. Optimum Traitor Tracing and Asymmetric Scheme[C].In: Proc of EUROCRPT′98, Berlin: Springe-Verlag, 1998:145~157.
  • 9Hirotaka Komaki,Yuji Watanable,Goichiro Hanka. Efficient Asymmetric Self-Enforcement Scheme with Public Traceability[C].In:PKC 2001,LNCS 1992,Berlin:Springer Verlag,2001:225~239.
  • 10Tatsuyuki Matsushita. A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing[C].In:ICICS 2002,LNCS 2513,Berlin: Springer-Verlag, 2002:197~208.

共引文献22

同被引文献13

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报,2006,33(3):422-424. 被引量:5
  • 3冯慧娟,马华,杨波.一种新的基于RSA加密算法的叛逆者追踪方案[J].计算机应用研究,2007,24(5):135-136. 被引量:5
  • 4Chor B, Fiat A, Naor M. Tracing traitors[J]. IEEE Trans- actions on Information Theory, 2000,46(3) :893-910.
  • 5Boneh D, Sahai A, Waters B. Fully collusion resistant trai- tor tracing with short ciphertexts and private keys[C]//Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2006: 573- 592.
  • 6Boneh D, Waters B. A fully collusion resistant broadcast, trace, and revoke system[C]//Proe of the 13the ACM Con- ference on Computer and Communications Security, 2006: 211-220.
  • 7Furukawa J, Attrapadung N. Fully collusion resistant black- box traitor tracing revocable broadcast encryption with short private keys[C]//Proc of the 34th International Colloquium on Automata, Languages and Programming, 2007:496-508.
  • 8Garg S, Kumarasuhramanian A, Sahai A, et al. Building eff- cient fully collusion-resilient traitor tracing and revocation schemes[ EB/OL]. [ 2012-06 01 ]. http://eprint, iacr. org/ 2009/532. pdf.
  • 9Park J H, Lee D H. Fully collusion-resistant traitor tracing seheme[EB/OL]. [2010-12-09]. http://protocol, korea, ae. kr/puhlication/Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, pdf.
  • 10Yang Bo, Ma Hua, Zhu Sheng-lin. A traitor tracing scheme based on the RSA system[J]. International Journal of Net- work Security, 2007, 5(2) :182-186.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部