期刊文献+

A.Fiat动态叛徒追踪方案的性能分析

Analysis of A.Fiat′s Dynamic Traitor Tracing Scheme
下载PDF
导出
摘要 叛徒追踪方案是在共谋密钥攻击和重放攻击中追踪及识别叛徒的有效措施.文中针对A.Fiat和T.Tassa提出的3个不同追踪算法,指出其理论算法在执行过程中的局限性,并在系统带宽要求和追踪复杂度方面对3个算法进行了分析比较,指出算法存在的性能缺陷,同时指出了此类算法未来的设计方向. Traitor tracing schemes play an important role in tracing and identifying the traitors in conspiracy and replay attack. We analyzed the three different algorithms proposed by A. Fiat and T. Tassa and showed that the academic algorithm has some localization when it was implemented. The performance of bandwidth and tracing complexity of the three algorithms were also analyzed. Finally the disadvantages of the algorithms and their limitations were presented.
作者 赵林森
出处 《微电子学与计算机》 CSCD 北大核心 2008年第12期165-168,共4页 Microelectronics & Computer
关键词 动态 叛徒追踪 复杂度 共谋 dynamic traitor tracing complexity conspiracy
  • 相关文献

参考文献6

  • 1陈国震.无线网络通信系统研究[J].微电子学与计算机,2006,23(5):190-192. 被引量:4
  • 2贺文华,陈志刚,胡玉平.基于IPv6的网络安全与性能分析[J].微电子学与计算机,2007,24(10):120-122. 被引量:7
  • 3Fiat A, Naor M. Broadcast encryption[C]//Advance in Cryptology- CRYPTO' 93. Berlin: Springer - Verlag, 1994(773) :480 - 491.
  • 4Chor B, Fiat A, Naor M. Tracing traitors[Cl//Advance in Cryptology- CRYPTO' 94. Berlin, Germany: Springer - Verlag, 1994(839) :257 - 270.
  • 5Fiat A, Tassa T. Dynamic traitor tracing[C]//Advance in Cryptology-CRYPTO'99. Berlin, Germany- SpringerVerlag, 1999 (1666) : 354 - 371.
  • 6Vu Elong To, Safavi- Naini R, Wang Yejing. A 2 - secure code with efficient tracing algorithm [ C ]// INDOCRYPT 2002. Berlin: Springer-Verlag, LNCS 2551, 2002 : 149 - 163.

二级参考文献10

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部