期刊文献+

基于双线性映射的公钥叛逆者追踪 被引量:6

Public-key traitor tracing based on the bilinear map
下载PDF
导出
摘要 基于椭圆曲线上Weil配对理论提出一种新的叛逆者追踪方案,利用Weil配对的双线性特性并结合简单多项式在方案中实现了以前方案所不具有的密钥托管,使得方案具有全程托管功能,允许托管代理用一个简单的密钥解密任意公开钥所加密的密文,有利于系统管理者管理整个系统,也有利于有关部门对整个行业实施监管.在同等安全级别下,相对于传统基于有限域上离散对数问题的叛逆者追踪,该方案在效率上占有相当优势. A new traitor tracing scheme is proposed by using the Well pairing in elliptic curves. The proposed scheme shows that the Well pairing enables us to add a global escrow capability to the traitor tracing system. A single escrow key enables the decryption of ciphertexts encrypted under any public key, which is essential for the system manager to manage the global situation. The authorities can also supervise the entire market and forbid the spread of had information with the global escrow capability. In addition, with the same security, this scheme, whose operations are on elliptic curves, is more efficient than the previous schemes based on the discrete-log problem over the group G.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2006年第6期935-938,952,共5页 Journal of Xidian University
基金 国家自然科学基金项目(60372046) 国家部委重点实验室基金项目资助(51436040204DZ0102)
关键词 叛逆者追踪 广播加密 电子版权保护 traitor tracing broadcast encryption electronic copyright protection
  • 相关文献

参考文献1

二级参考文献10

  • 1Pfizmann B, Waidner M. Asymmetric Fingerprinting for large Collusions[A]. Pmc of ACMCCS'97[C]. Zurich: ACM, 1997. 145-157.
  • 2Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Asymmetric Scheme[ A]. Proc of EUBOCBYFT98[ C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 3Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[A]. Proc of STOC'99[C]. Atlanta: ACM, 1999. 245-254.
  • 4Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. Proc of CRYPTO'99[C]. Berlin: Sprinber-Verlag, 1999.338-353.
  • 5Yohida M, Fujiwara T. A Subscriber Unauthorizable and Traitor Traceable Broadcast Distribution System[ A]. Proc of SCIS'2000[ C ].Okinawa: Springer-Verlag, 2000. 245-258.
  • 6Abdalla M, Shavitt Y, Wool A. Towares Making Broadcast Encryption Practical[A]. FC'99[C]. Berlin: Springer-Veralg, 1999. 140-157.
  • 7Kocher P, Jaffe J, Jun B. Differential Power Analysis[ A]. Advances in Cryptology-CBYPTO'99[ C]. Berlin: Springer-Vedag, 1999.388-397.
  • 8Chor B, Fiat A, Naor M. Tracing Traitors[ A]. Advances in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 9Pfitzmann B. Trail of Traced Traitor[A]. Proc of Information Hiding'96~C]. Berlin: Sprinber-Verlag, 1996.49-64.
  • 10杨波,孙晓蓉,王育民.基于门限方案的密钥托管[J].西安电子科技大学学报,1998,25(2):239-241. 被引量:9

共引文献10

同被引文献37

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部