期刊文献+

一种新的基于RSA加密算法的叛逆者追踪方案 被引量:5

New Traitor Tracing Scheme Based on RSA
下载PDF
导出
摘要 叛逆者追踪方案是广播加密系统中保护版权的重要工具。基于RSA加密算法提出了一种新的叛逆者追踪方案,与现有的两种基于该加密算法的方案相比,该方案具有可撤销叛逆者和增加用户的优点。 Traitor tracing schemes are a very important tool for copyright protection in broadcast encryption systems. Based on RSA, a new traitor tracing scheme was proposed. Compared with the existing two schemes based on the algorithm, the scheme has the advantages of revoking traitors and adding users.
出处 《计算机应用研究》 CSCD 北大核心 2007年第5期135-136,共2页 Application Research of Computers
基金 国家自然科学基金资助项目(60372046)
关键词 叛逆者追踪 RSA算法 撤销叛逆者 增加用户 traitor tracing RSA algorithm revoking traitors adding users
  • 相关文献

参考文献6

  • 1CHOR B,FIAT A,NAOR M.Tracing traitors:proc.of CRYPTO[C].Berlin:Springer-Verlag,1994:257-270.
  • 2BONEH D,FRANKLIN M.An efficient public key traitor tracing scheme:proc.of CRYPTO[C].Berlin:Springer-Verlag,1999:338-353.
  • 3KIAYIAS A,YUNG M.Breaking and repairing asymmetric public-key traitor tracing:proc.of ACM Workshop on Digital Rights Management[C].Berlin:Springer-Verlag,2003:32-50.
  • 4TZENG Wenguey,TZENG Zhijia.A public-key traitor tracing scheme with revocation using dynamic shares:proc.of Public Key Cryptography[C].Berlin:Springer-Verlag,2001:207-224.
  • 5马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 6MCGREGOR J P,YIN Y L,LEE R B.A traitor tracing scheme based on RSA for fast decryption:proc.of Applied Cryptography and Network Security[C].Berlin:Springer-Verlag,2005:56-74.

二级参考文献7

  • 1Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. CRYPTO 1999[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 2Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advances in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 3Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[A]. ACM Workshop on Digital Rights Managements[C]. Berlin: Springer-Verlag, 2002. 207-224.
  • 4Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Tracing and Asymmetric Schemes[A]. EUROCRYPT 1998[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 5Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[A]. PKC 2001[C]. Berlin: Springer-Verlag, 2001. 207-224.
  • 6Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[A]. CT-RSA 2001[C]. Berlin: Springer-Verlag, 2001. 392-407.
  • 7李勇,杨波,华翔.一种高效匿名的数字指纹方案[J].西安电子科技大学学报,2003,30(3):394-398. 被引量:7

共引文献19

同被引文献43

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部