期刊文献+

公开追踪和CCA2安全的叛逆者追踪方案

Public Traceable Traitor Tracing Scheme Secure against CCA2
下载PDF
导出
摘要 提出一种新的k-resilient公钥叛逆者追踪方案。方案的追踪方式为公开黑盒追踪。假设DDH问题为困难问题,则方案能被证明是自适应选择密文攻击安全的,并且在撤销不超过k个叛逆者条件下仍然是自适应选择密文攻击安全的。与同类方案相比,该方案没有使用一次性消息认证码假设,并且有效降低了追踪时的计算复杂性。另外,方案满足非对称性。 A new k-resilient public-key traitor tracing scheme was proposed.A traitor in this scheme can be traced by the way of public black-box tracing mean.Meanwhile,our scheme is provably secure against adaptive chosen ciphertext attack assume that DDH problem is difficulty.Our scheme remains CCA2-secure when not more thanktraitors are re-voked.Compared with similar schemes,our scheme does not use one-time message authentication code assumption and reduces the tracing complexity greatly.Further,our scheme satisfies asymmetry.
出处 《计算机科学》 CSCD 北大核心 2011年第2期106-109,130,共5页 Computer Science
基金 国家自然科学基金(60773175) 中央高校基本科研业务费专项基金(CHD2009JC146) 长安大学基础研究支持计划专项基金资助。
关键词 叛逆者追踪 广播加密 消息认证码 可证明安全性 非对称性 Traitor tracing Broadcast encryption MAC Provable security Asymmetry
  • 相关文献

参考文献17

  • 1Jin H X,Lotspiech J.Hybrid traitor tracing[C] ∥IEEE International Conference on multimedia and expo.New York:IEEE Press,2006:1329-1332.
  • 2Kazuto O,Go O.Goichiro H.Trade-off traitor tracing[C] ∥INDOCRYPT2007.Berlin:Springer press,2007:331-340.
  • 3Lv Xi-xiang,Yang Bo.Efficient Traitor tracing scheme based on NTRU[C] ∥PDCAT'05.San Jose:IEEE Computer Society Press,2005:120-124.
  • 4Pascal J,Alexandre K,Arjen K.Improving the boneh-franklin traitor tracing scheme[C] ∥PKC '09.Berlin / Heidelberg:Springer press,2009:88-104.
  • 5Michel A,Alexander W D,John M L,et al.Identity-based traitor tracing[C] ∥PCK2007.Berlin / Heidelberg:Springer press,2007:361-376.
  • 6Hongxia J,Jeffory B L,Mario B.Traitor tracing for subscrip-tion-based systems[C] ∥SECRYP2006.Portugal:TINSTICC press,2006:223-228.
  • 7Wu Yong-dong,Robert H D.On the security of fully collusion resistant traitor tracing schemes[EB/OL].http://eprint.iacr.org/2008/450.pdf,2008-10-24.
  • 8Aggelos K,Serdar P.Pirate evaluation:how to make most of your traitor keys[C] ∥Crypt2007.Berlin:Springer press,2007:448-465.
  • 9Duong H P,Reihaneh S N,Ngvu T.Generic construction of hybrid public key traitor tracing with full-public-traceability[C] ∥ICALP2006.Berlin:Springer Press,2006:264-275.
  • 10Aggelos K,Moti Y.Breaking and repairing asymmetric public-key traitor tracing[C] ∥DRM 2002.Heidelberg:Springer Press,2003:32-50.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部