期刊文献+

支持多服务的CRT叛逆追踪方案

MULTI-SERVICE SUPPLIED CRT TRAITOR TRACING SCHEME
下载PDF
导出
摘要 随着网络应用的不断研究和发展,叛逆追踪技术的研究和方案的构造倍受业内研究人员的关注。通过构造基于辫群安全问题的非对称加密方式,增强密文块的安全性,实现多服务的支持;通过改进基于中国剩余定理的使能块安全加密,实现叛逆用户的判定和追踪。改进的叛逆追踪方案既保持了原有方案的黑盒追踪高效率,可证明安全性和良好的添加和撤销,还支持多服务,具有更高的安全性和不可抵赖性。 With the continuous research and development of network applications, researches and schemes of traitor tracing technology are attracting much attention from researchers. The paper, by constructing braid group security issue based asymmetric encryption method, strengthens cipher text blocks' security and realizes multi-service supplication, and by improving Chinese remainder theorem based can block secure encryption, realizes traitor user determination and tracing. The improved traitor tracing scheme not only maintains the original scheme's black box tracing efficiency, so that it can validate security as well as fine addition and revocation, hut also supports multiple services so that it bears higher security and non-repudiation.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第3期310-313,共4页 Computer Applications and Software
基金 武警工程大学基础研究基金项目(WJY201111) 武警工程大学研究生科研创新课题(2012S011)
关键词 信息安全 中国剩余定理 辫群 叛逆追踪 Information security Chinese remainder theorem Braid group Traitor tracing
  • 相关文献

参考文献12

二级参考文献40

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
  • 3曹毅,贺卫红.基于辫群的密钥交换协议算法的分析与实现[J].微机发展,2004,14(12):53-54. 被引量:2
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communication Security. Japan: Tokyo, 1996:48-57.
  • 5Ki Hyoung Ko, Sang Jin Lee, Jung Hee Cheon, et al New public key cryptosystem using braid groups[C]// LNCS 1880 : Proc of Crypto2000. Berlin: Springer- Vetlag, 2000 : 166-183.
  • 6Verma G K. A proxy signature scheme over braid groups [EB/OL]. [2011- 01- 05] http://eprint, iacr. org/ 2008/160. pdf.
  • 7Ko K H, Cho ID H, Chom S, et al. New signature scheme using eonjugaey problem [ EB/OL ]. [2008-05-18 ].http: / / eprint, ia2 er. org/2002/168, pdf.
  • 8Chor B,Fiat A,Naor M.Tracing traitors[C]//Advances in Cryptology-CRYPT'94.Berlin:Springer-Verlag,1994:257-270.
  • 9Tzeng Wenguey,Tzeng Zhijia.A Public-key traitor tracing scheme with revocation using dynamic shares[C]//PKC 2001 Berlin:Springer-Verlag,2001:207-224.
  • 10Pfitzmann B.Trials of traced traitors[C]//Information Hiding'96.Berlin:Springer-Verlag,1996:49-64.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部