期刊文献+

基于NTRU加密系统的叛逆者追踪方案 被引量:1

Traitor Tracing Scheme Based on NTRU
下载PDF
导出
摘要 基于NTRU公钥加密系统和中国剩余定理,提出了一种新的叛逆者追踪方案。该方案在无需第三方参与的前提下可抵抗任意数目的共谋攻击,识别所有叛逆者,可进行黑盒子追踪并具有匿名性、非对称性和可扩展性。 A new traitor tracing scheme based on NTRU cryptosystem and Chinese remainder theorem is proposed . The scheme is deterministic and catch all active traitors without any trusted third party regardless of the number of traitors. Even if a coalition of subscribers conspire to create a pirate decoder with a tamper-free decryption key, we have a tracing algorithm to trace them. Finally, the scheme guarantees anonymity,asymmetry and long-liveness.
作者 杨文峰 杨波
出处 《计算机应用研究》 CSCD 北大核心 2006年第11期87-88,91,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60372046) 现代通信国家重点实验室基金资助项目(51436040204DZ0102)
关键词 叛逆者追踪 NTRU算法 黑盒子追踪 Traitor Tracing NTRU Algorithm Black Box Tracing
  • 相关文献

参考文献6

  • 1B Chor, A Fiat, M Naor. Tracing Traitors[ C]. CRYPTO'94, Berlin:Springer-Verlag,1994. 257-270.
  • 2J Hoffstein,J Pipher, J H Silverman. NTRU: A New High Speed Public Key Cryptosystem [ C ]. Proc. of Algorithm Number Theory( ANTS Ⅲ), Berlin : Springer-Verlag, 1998. 267- 288.
  • 3A Kiayias, M Yung. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[ C ]. Berlin: ACM Workshop on Digital Rights Managements, Springer-Verlag, 2002. 207 - 224.
  • 4K Kurosawa, Y Desmedt. Optimum Traitor Tracing and Asymmetric Schemes [ C ] Berlin: EUROCRPYT, Springer-Verlag, 1998. 145-157.
  • 5W G Tzeng, Z J Tzeng. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares [ C ]. Berlin : PKC, Springer-Verlag, 1992. 207- 224.
  • 6Y Watanable, G Hanaoka, H Iami. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents [ C ]. Berlin : CT-RSA, Springer-Verlag, 2001. 392-407.

同被引文献8

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报,2006,33(3):422-424. 被引量:5
  • 3Chor B, Fiat A, Naor M. Tracing Traitors [ C ]//Proceedings of the 14th International Crypotology Advances in Cryptology- CRYPTO'9d, LNCS839. Berlin: SPringer-Verlag, 1994:257-270.
  • 4John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee, A Traitor Tracing Scheme Based on RSA for Fast Decryption [ C ] // Proceeding of ACNS 2005, LNCS 3531. New York: SPringer- Verlag, 2005:56-74.
  • 5Mitsunari S, Sakai R, Kasahara M. A New Traitor Tracing [ J ] IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2002, E85-A (2) 481-484.
  • 6ToVD, Safavi-NainiR, ZhangF. New traitor tracing sehemes using bilinear map[ C ]//Proceedings of the 3rd ACM workshop on Digital rights management. New York: ACM, 2003:67-76.
  • 7Yuji Watanabe, Goichiro Hanaoka, Hideki lmai. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents [C ]//Proceedings of CT-RSA'2001, LNCS2020. Berlin: SPringer-Verlag, 2001 : 392-407.
  • 8Aggelos Kiayias, Moti Yung. Breaking and Repairing Asymmetric Public-Key Traitor Tracing [ C ] // Digital Right Management 2002. LNCS 2696. Berlin:Springer-Verlag, 2003 : 32-50.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部