期刊文献+

面向多服务的基于大整数分解困难问题的叛逆者追踪方案 被引量:5

A Multi-service Oriented Traitor Tracing Scheme on LIFP
下载PDF
导出
摘要 该文提出了一种面向多服务的基于大整数分解困难问题的叛逆者追踪方案。该方案的主要思想是基于大整数分解困难问题构造等式,并引进参数传递服务密钥,解密时利用上述等式和服务密钥可获得会话密钥。与现有两种方案相比,新方案具有多服务、黑盒追踪、密文长度是常量、增加用户或撤销用户以及前向安全性和后向安全性等优点,整体性能好于现有两种方案。 A multi-service traitor tracing scheme on LIFP(Large Integer Factoring Problem) is proposed, the essential idea of which is that an equation based on LIFP is constructed and a parameter is introduced to transfer service private-key. In decryption procedure, the session key can be obtained by the equation a^d the service private-key. Compared with the existing two traitor tracing schemes, this scheme has many advantages such as multi-service, black-box traitor tracing, ciphertexts of constant size, adding or revoking users, forward-security and backward-security. Furthermore, its whole capabilities are better than that of the existing ones.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第5期1177-1181,共5页 Journal of Electronics & Information Technology
基金 甘肃省教育厅科研项目(0601B-08) 中国博士后科学基金资助项目(20060400035) 国家自然科学基金(60372046)资助课题
关键词 叛逆者追踪 大整数分解问题 多服务 黑盒追踪 前向安全性 后向安全性 Traitor tracing Large integer factoring problem Multi-service Black-box tracing Forward-security Backward-security
  • 相关文献

参考文献12

  • 1Chor B,Fiat A,and Naor M.Tracing traitors.Advances in Cryptology-CRYPT'94,1994,LNCS,Vol.839:257-270.
  • 2Kurosawa K and Desmedt Y.Optimum traitor tracing and asymmetric schemes.Proc.of Eurocrypt98,1998,LNCS,Vol.1403:145-157.
  • 3Boneh D and Franklin F.An efficient public key traitor tracing scheme.Proc.of CRYPTO'99,1999,LNCS,Vol.1666:338-353.
  • 4Tzeng Wen-Guey and Tzeng Zhi-Jia.A public-key traitor tracing scheme with revocation using dynamic shares.PKC'2001,2001,LNCS,Vol.1992:207-224.
  • 5Kurosawa K and Yoshida T.Linear code implies public-key traitor tracing.PKC'02,2002,LNCS,2274:172-187.
  • 6Kiayias A and Yung M.Traitor tracing with constant transmission rate.Eurocrypt'02,2002,LNCS,Vol.2332:450-465.
  • 7Kiayias A and Yung M.Breaking and repairing asymmetric public-key traitor tracing.2002 ACM Workshop on DRM,2003,LNCS,Vol.2696:32-50.
  • 8Vu Dong To and Reihaneh Safavi-Naini.Linear code implies public-key traitor tracing with revocation.ACISP' 2004,2004,LNCS,Vol.3108:24-35.
  • 9Hervé Chabanne,Duong Hieu Phan,and David Pointcheval.Public traceability in traitor tracing schemes.Advances in Cryptology-Proceedings of Eurocrypt'05,2005,LNCS,Vol.3494:542-558.
  • 10马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20

二级参考文献7

  • 1Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. CRYPTO 1999[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 2Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advances in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 3Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[A]. ACM Workshop on Digital Rights Managements[C]. Berlin: Springer-Verlag, 2002. 207-224.
  • 4Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Tracing and Asymmetric Schemes[A]. EUROCRYPT 1998[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 5Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[A]. PKC 2001[C]. Berlin: Springer-Verlag, 2001. 207-224.
  • 6Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[A]. CT-RSA 2001[C]. Berlin: Springer-Verlag, 2001. 392-407.
  • 7李勇,杨波,华翔.一种高效匿名的数字指纹方案[J].西安电子科技大学学报,2003,30(3):394-398. 被引量:7

共引文献19

同被引文献38

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部