期刊文献+

基于广播加密的对称叛逆者追踪方案分析 被引量:1

The Analysis of Symmetric Traitor Tracing Scheme Based on Broadcast Encryption
下载PDF
导出
摘要 对基于广播加密的对称叛逆者追踪方案进行了讨论与分析。结果表明:当用户数n不是太大时,对称方案具有高效、简单、安全性高的特性。在对称叛逆者追踪方案中,数字信息的解密密钥并非由用户单方面所知,而是由用户和数据发行商双方所共知。因此,数据发行商完全可以恶意使用此私有密钥,来诬陷诚实的授权用户。所以对称叛逆者方案不具备防诬陷性。针对对称方案的缺陷,研究出非对称方案。在非对称方案中,授权用户的解密密钥仅其本人知道,数据供应商一无所知,从而弥补了对称方案的可否认、可诬陷性。通过对4种具有代表性的对称叛逆者追踪方案的分析,在安全性的基础上,对其进行改进,可进一步研究出具有更多特性的叛逆者追踪方案。 This paper discusses the symmetric traitor tracing scheme based on broadcast encryption. The results show that the symmetric scheme is efficient, simple and secure when the number of users is not very large. But in the symmetric scheme, data supplier generates the decryption key of the digital information and distributes it to every user. Therefore data supplier can frame the honest user. That is to say the symmetric scheme has not feature to prevent the frame behavior of the data supplier. There are some asymmetric schemes which make up the defects in the symmetric scheme, because data supplier doesn't know the users encryption key in asymmetric scheme. Based on analysis of four symmetric traitor tracing schemes, especially their security, some schemes with more characteristics will be proposed.
出处 《北京印刷学院学报》 2011年第4期46-50,共5页 Journal of Beijing Institute of Graphic Communication
基金 北京市属高等学校人才强教计划资助项目(PXM2010014223095557) 北京印刷学院重点项目资助(Ea2011005)
关键词 叛逆者 广播加密 追踪 对称加密 traitor broadcast encryption tracing symmetricencryption
  • 相关文献

参考文献9

  • 1Chor B, Fiat A, Naor M. Tracing Traitors [ C ]//Proceedings of the 14th International Crypotology Advances in Cryptology- CRYPTO'9d, LNCS839. Berlin: SPringer-Verlag, 1994:257-270.
  • 2马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 3马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报,2006,33(3):422-424. 被引量:5
  • 4John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee, A Traitor Tracing Scheme Based on RSA for Fast Decryption [ C ] // Proceeding of ACNS 2005, LNCS 3531. New York: SPringer- Verlag, 2005:56-74.
  • 5Mitsunari S, Sakai R, Kasahara M. A New Traitor Tracing [ J ] IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2002, E85-A (2) 481-484.
  • 6ToVD, Safavi-NainiR, ZhangF. New traitor tracing sehemes using bilinear map[ C ]//Proceedings of the 3rd ACM workshop on Digital rights management. New York: ACM, 2003:67-76.
  • 7杨文峰,杨波.基于NTRU加密系统的叛逆者追踪方案[J].计算机应用研究,2006,23(11):87-88. 被引量:1
  • 8Yuji Watanabe, Goichiro Hanaoka, Hideki lmai. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents [C ]//Proceedings of CT-RSA'2001, LNCS2020. Berlin: SPringer-Verlag, 2001 : 392-407.
  • 9Aggelos Kiayias, Moti Yung. Breaking and Repairing Asymmetric Public-Key Traitor Tracing [ C ] // Digital Right Management 2002. LNCS 2696. Berlin:Springer-Verlag, 2003 : 32-50.

二级参考文献14

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. CRYPTO 1999[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 3Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advances in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 4Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[A]. ACM Workshop on Digital Rights Managements[C]. Berlin: Springer-Verlag, 2002. 207-224.
  • 5Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Tracing and Asymmetric Schemes[A]. EUROCRYPT 1998[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 6Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[A]. PKC 2001[C]. Berlin: Springer-Verlag, 2001. 207-224.
  • 7Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[A]. CT-RSA 2001[C]. Berlin: Springer-Verlag, 2001. 392-407.
  • 8B Chor, A Fiat, M Naor. Tracing Traitors[ C]. CRYPTO'94, Berlin:Springer-Verlag,1994. 257-270.
  • 9J Hoffstein,J Pipher, J H Silverman. NTRU: A New High Speed Public Key Cryptosystem [ C ]. Proc. of Algorithm Number Theory( ANTS Ⅲ), Berlin : Springer-Verlag, 1998. 267- 288.
  • 10A Kiayias, M Yung. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[ C ]. Berlin: ACM Workshop on Digital Rights Managements, Springer-Verlag, 2002. 207 - 224.

共引文献19

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部