期刊文献+

改进的基于双线性映射叛逆者追踪方案 被引量:2

An Improved Traitor Tracing Scheme Based on Bilinear Map
下载PDF
导出
摘要 基于双线性映射可撤销用户的叛逆者追踪方案是对称方案,但没有提供不可否认性.针对此问题,利用不经意多项式估值(OPE)协议和服务参数提出了一个改进的方案.改进方案在保持与原方案性能大体相同的前提下,增加了提供多种服务、用户无法抵赖其叛逆行为和数据提供商无法陷害无辜用户等优点;同样在判定双线性Diffie-Hellman(DBDH)问题的假设下,证明了改进方案是语义上安全的. To et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved To scheme was proposed using oblivious polynomial evaluation (OPE) protocol and service parameters. Under the precondition of general sameness capabilities of both To's and improved To's scheme, the new scheme adds some advantages such as providing multi-service capability, user's non-repudiation and data provider' s noframing innocent users. Furthermore, it is also proved to be semantically secure under the decisional bilinear Diffie-Hellman problem (DBDH) assumption.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第6期17-20,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60372046) 华为基金项目(YSCB2005037NP)
关键词 双线性映射 叛逆者追踪 多服务性 非对称性 bilinear map traitor tracing multi-service asymmetry
  • 相关文献

参考文献7

  • 1[3]Chor B,Fiat A,Naor M.Tracing traitors[C] //Desmedt Y.Advances in Cryptology in Proceedings Crypto' 94.Berlin:Springer-Verlag,1994:257-270.
  • 2[4]Tzeng W G,Tzeng Z J.A public-key traitor tracing scheme with revocation using dynamic shares[C] //Kwangjo K.Public Key Cryptography,4th International Workshop on Practice and Theory in Public Key Cryptography.Berlin:Springer-Verlag,2001:207-224.
  • 3[5]Mitsunari S,Sakai R,Kasahara M.A new traitor tracing[J].IEICE Trans Fundamentals,2002,E85-A(2):481-484.
  • 4[6]T(o) V D,Safavi-Naini R,Zhang F.New traitor tracing schemes using bilinear map[C] // Wang H,Pieprzyk J,Varadharajan V.Proeeding of the 2003 ACM Workshop on DRM.New York:ACM Press,2003:67-76.
  • 5[7]Chabanne H,Hieu P D,Pointcheval D.Public traceability in traitor tracing schemes[C] // Cramer R.Advances in Cryptology in Proceedings Eurocrypt '05.Berlin:Springer-Verlag,2005:542-558.
  • 6[8]Pfitzmann B.Trials of traced traitors[C] //Ross J.Proceeding of Information Hiding Workshop (Information Hiding' 96).Berlin:Springer-Verlag,1996:49-64.
  • 7[9]Naor M,Pinkas B.Oblivious transfer and polynomial evaluation[C] // Proceeding of the 31st Annual ACM Symposium on Theory of Computing.Atlanta:ACM Press,1999:245-254.

同被引文献22

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报,2006,33(3):422-424. 被引量:5
  • 3张学军,王东勇,曾智勇,尹忠海.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报,2007,34(2):274-278. 被引量:7
  • 4杨晨,马文平,王新梅.新的有效叛逆者追踪方案[J].西安交通大学学报,2007,41(8):931-933. 被引量:1
  • 5CHOR B, FIAT A, NAOR M. Tracing traitors[C]//Crypto logy-CRYPT'94. Berlin: Spdnger-Verlag, 1994: 388-397.
  • 6KIAYIAS A, YUNG M. Breaking and repairing asymmetric public-key traitor tracing[C]//2002 ACM Workshop on DRM. Berlin : Springer-Verlag, 2003: 32-50.
  • 7HERVE C, DUONG H P, DAVID P. Public traceability in traitor tracing schemes[C]//Advances in Cryptology-Proceedings of Eurocrypt'05. Berlin: Springer-Verlag, 2005: 542-558.
  • 8MATSUSHITA T. A flexibly revocable key-distribution scheme for efficient black-box tracing[J]. IEICE Trans Fundamentals, 2005, E88-A(4): 1055-1062.
  • 9Tzeng Wen-Guey, Tzeng Zlai-Jia. A public-key traitor tracing scheme with revocation using dynamic shares[J]. Designs, Codes and Cryptography, 2005, 35(1): 47-61.
  • 10MCGREGOR J P, YIN Y L, LEE R B. A traitor tracing scheme based on RSA for fast decryption[C]//ACNS 2005. Berlin: Springer-Verlag, 2005: 56-74.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部