期刊文献+

基于群的公钥叛逆者追踪方案 被引量:1

Group-based Public Key Traitor Tracing Scheme
下载PDF
导出
摘要 为有效保护数据提供者的合法权益,提出一种基于群的公钥叛逆者追踪方案。依据群合谋的行为特征将合法用户分成不同的群,利用分群思想生成更多合法密钥。在叛逆者检测时将可疑用户缩小到特定群,从而提高检测效率。通过求解大整数分解困难问题和离散对数困难问题证明,该方案完全抗合谋,且具有黑盒追踪性。 To protect the legal interests of copyright owners efficiently, this paper presents a group-based public key pirate tracing scheme. Legal users are divided into groups. By applying group-oriented technique, they can construct more decryption keys. The tracing algorithm is faster as it can first narrow down the traitor to specific group. By combining the discrete log representation problem and large integer factoring problem, this scheme is full collusion resistant, and it has the advantage of black-box tracing.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第4期161-162,180,共3页 Computer Engineering
关键词 抗共谋 加密和解密 黑盒追踪 collusion-resistance encryption and decryption black-box tracing
  • 相关文献

参考文献8

  • 1Chor B, Fiat A, Naor M. Tracing Traitors[J]. IEEE Transactions on Information Theory, 1994, 30(6): 257-270.
  • 2Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[C]//Proc. of the 19th Annual International Cryptology Conference on Advances in Cryptology. [s. n.]: Springer-Verlag, 1999.
  • 3Tonien D, Reihaneh S N. An Efficient Single-key Pirates Tracing Scheme Using Cover-free Families[C]//Proc. of 2005 Conference on Applied Cryptography and Network Security. Singapore: Springer-Verlag, 2006.
  • 4McGregor J R Yin Yiqi, Lee R B. A Traitor Tracing Scheme Based on RSA for Fast Decryption[C]//Proc. of 2005 Conference on Applied Cryptography and Network Security. New York, USA: Springer-Verlag, 2005.
  • 5吕锡香,张卫东,杨文峰.基于双线性映射的非对称公钥叛逆者追踪[J].计算机工程,2009,35(3):4-6. 被引量:5
  • 6Mitsunari S, Sakai R, Kasahara M. A New Traitor Tracing[J]. IEICE Transactions on Fundamentals of Electronics, Communi- cations and Computer Sciences, 2002, E85-A(2): 481-484.
  • 7He Shan.Wu Min. Joint Coding and Embedding Techniques for Multimedia Fingerprinting[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2): 231-247.
  • 8徐光宝,姜东焕.抗合谋攻击的门限签名方案分析与改进[J].计算机工程,2010,36(20):155-156. 被引量:7

二级参考文献19

  • 1谢琪.两种门限签名方案的密码学分析及其改进[J].通信学报,2005,26(7):123-128. 被引量:16
  • 2LV Xixiang,YANG Bo.Traitor Tracing Using Identity Based Public-key Cryptography[J].Chinese Journal of Electronics,2006,15(4):687-691. 被引量:4
  • 3Chor B, Fiat A, Naor M. Tracing Traitors[J]. IEEE Transactions on Information Theory, 1994, 30(6): 257-270.
  • 4Naor M, Pinkas B. Threshold Traitor Tracing[C]//Proc. of the 18th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1998: 502-517.
  • 5Silverberg A, Staddon J, Walker J. Efficient Traitor Tracing Algorithms Using List Decoding[C]//Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK: Springer-Verlag, 2001: 175-192.
  • 6Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Asymmetric Schemes[M]. Berlin, Germany: Springer-Verlag, 2006: 145-157.
  • 7Watanabe Y, Hanaoka G, Hideki I. Efficient Asymmetric Public-key Traitor Tracing Without Trusted Agents[M]. Berlin, Germany: Springer-Verlag, 2001:392-407.
  • 8Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-key Traitor Tracing[M]. Berlin, Germany: Springer-Verlag, 2003: 32-50.
  • 9Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[C]//Proc. of the 19th Annual International Cryptology Conference on Advances in Cryptology. Berlin, Germany: Sprinber-Verlag, 1999: 338-353.
  • 10Mitsunari S, Sakai R, Kasahara M. A New Traitor Tracing Scheme[J]. IEICE Trans. on Fundamentals, 2002, 85(2): 481-484.

共引文献10

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部