期刊文献+

免共谋公钥叛逆者追踪方案 被引量:10

Collusion-free public-key traitor tracing scheme
下载PDF
导出
摘要 当参与共谋的叛逆者不超过某个预先给定的范围时,现有的叛逆者追踪方案都可以追踪出至少一个叛逆者,但是如何阻止共谋的发生还是一个有待解决的问题。提出一种新的叛逆者追踪方案,方案中不同用户间的解密钥是不相关的,这样无论多少个用户都不能通过共谋构造出一个解密钥来,并且能快速准确地追踪出叛逆者,对潜在的不良用户有更好的威慑作用。与现有方案相比,本方案具有更高的传输效率。 All the existing traitor tracing schemes can trace at least a traitor when the number of traitors is not beyond a certain predefined value. However, how to prevent traitors from colluding a valid key is a open problem. A new traitor tracing scheme was presented, in which traitors can not get a valid key by conspiracy, no matter how many traitors there were because each user's decryption key was independent of any others. Further, our scheme can determine a traitor in speediness and accuracy, thus it can reach a better determent to those potential bad users. Meanwhile, compared with present schemes, this scheme has a higher transmission efficiency.
出处 《通信学报》 EI CSCD 北大核心 2006年第12期6-9,共4页 Journal on Communications
基金 国家自然科学基金资助项目(60372046 60573043)~~
关键词 叛逆者 不相关 共谋 传输效率 traitor independent collusion efficiency
  • 相关文献

参考文献9

  • 1CHOR B, FLAT A, NAOR M.Tracing traitors, dvances cryptology[A].Proc CRYPTO'94[C]. Berlin:Springer-Vedag, 1994. 257-270.
  • 2YU J W, GOICHIRO H, HIDEK I. Efficient asymmetric public-key traitor tracing without trusted agents[A]. Proc CT-RSA 2001[C]. Berfin: Springer-Verlag, 2001. 392-407.
  • 3AGGELOS K, MOTI Y. Breaking and repairing asymmetric pubtic-key traitor tracing[A]. ACM Digital Rights Management: (revised papers)[C]. Berlin: Springer-Verlag, 2003.32-50.
  • 4BONEH D, FRANKLIN M. An efficient public key traitor tracing scheme[A]. Proc CRYPTO'99[C]. Berlin: Sprinber-Verlag, 1999. 338-353.
  • 5KUROSAUA K, DESMEDT Y. Optimum traitor tracing and asymmetric scheme[A] . Proc EUROCRYPTO'98[C]. Berlin : Springer-Verlag, 1998. 145-157.
  • 6TEANG W G,TZENG Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamical Shares[Z]. PKC'2001.
  • 7LYUU Y D. A fully public-key traitor tracing scheme[EB/OL].http://www.csie.ntu.edu.tw/-lyuu/lyuu.html, 2004.
  • 8MCGREGOR J P, YIN Y L, RUBY B L.A traitor tracing scheme based on RSA for fast decryption[A]. Applied Cryptography and Network Security: Third International Conference[C]. New York,2005.56-74
  • 9YAN J J, WU Y D. An attack on a traitor tracing scheme[EB/OL].http://www.cl.cam.ac.uk/-jy212/oaldand02.pdf, 2004

同被引文献76

引证文献10

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部