期刊文献+

一种可抵抗线性攻击的非对称公钥叛逆者追踪方案

An asymmetric public-key traitor tracing scheme against linear attack
在线阅读 下载PDF
导出
摘要 提出了一种可抵抗线性组合(凸组合)攻击的公钥叛逆者追踪方案,利用不经意多项式估值协议构造密钥协商过程,具有非对称的追踪能力及直接不可否认性、防诬陷性等特点,并可确定出所有叛逆用户.由于该方案在发送加密数据产品时不涉及用户解密密钥的任何信息,从而与现有方案相比较提高了安全性能. A public-key traitor tracing scheme against linear combination(convex combination) attack is presented, which makes use of the oblivious polynomial evaluation protocol in the secret key negotiation process to achieve the asymmetric tracing ability and properties of direct non-repudiation, full frameproof. In addition, all the traitors can be determined by overwhelming probobility in our scheme. Furthermore, any information on the decreption key of users will not be involved in broadcasting data products, and compared with current schemes, security is improved.
作者 于志强 杨波
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第6期943-947,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(60372046)
关键词 公钥 攻击 追踪 解密 加密 发送 密钥协商 数据产品 协议 方案 traitor tracing convex combination direct non-repudiation full frameproof
  • 相关文献

参考文献10

  • 1Kocher P, Jaff J, Jun B. Differential Power Analysis[A]. Advances in Cryptology-CRYPTO'99[C]. Berlin: Springer-Verlag, 1999. 388-397.
  • 2Watanabe Y, Hanaoka G, Imai H. Efficient Asymmetric Public-key Traitor Tracing Without Trusted Agents[A]. Proc of CT-RSA[C]. San Francisco: Springer-Verlag, 2001. 392-403.
  • 3Kurosawa D Y. Optimum Traitor Tracing and Asymmetric Schemes[A]. Proc of Eurocrypt'98[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 4Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-key Traitor Tracing[DB/OL]. http://crypto.stanford.edu/DRM2002/asymvpp2.pdf, 2000-10-12.
  • 5Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. Advances in Crytpology-CRYPTO'99[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 6Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[A]. Proc of STOC'99[C]. New York: ACM, 1999. 245-254.
  • 7李勇,杨波.一种高效非对称的动态公钥叛逆者追踪方案[J].西安电子科技大学学报,2003,30(5):654-658. 被引量:11
  • 8Bleichenbacher D, Nguyen Q. Noisy Polynomial Interpolation and Noisy Chinese Remaindering[A]. Proc of CRYPTO'2000[C]. Berlin: Springer-Verlag, 2000. 53-69.
  • 9Naor M, Reingold O. Number-theoretic Constructions of Efficient Pseudo-random Function[A]. Proc of 38th IEEE Symp on Foundations of Computer Science[C]. Miami: IEEE, 1997. 458-467.
  • 10Berlekamp E, Welch L. Error Correction of Algebraic Block Codes[M]. US: Patent, 1986. 4, 633, 470.

二级参考文献10

  • 1Pfizmann B, Waidner M. Asymmetric Fingerprinting for large Collusions[A]. Pmc of ACMCCS'97[C]. Zurich: ACM, 1997. 145-157.
  • 2Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Asymmetric Scheme[ A]. Proc of EUBOCBYFT98[ C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 3Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[A]. Proc of STOC'99[C]. Atlanta: ACM, 1999. 245-254.
  • 4Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. Proc of CRYPTO'99[C]. Berlin: Sprinber-Verlag, 1999.338-353.
  • 5Yohida M, Fujiwara T. A Subscriber Unauthorizable and Traitor Traceable Broadcast Distribution System[ A]. Proc of SCIS'2000[ C ].Okinawa: Springer-Verlag, 2000. 245-258.
  • 6Abdalla M, Shavitt Y, Wool A. Towares Making Broadcast Encryption Practical[A]. FC'99[C]. Berlin: Springer-Veralg, 1999. 140-157.
  • 7Kocher P, Jaffe J, Jun B. Differential Power Analysis[ A]. Advances in Cryptology-CBYPTO'99[ C]. Berlin: Springer-Vedag, 1999.388-397.
  • 8Chor B, Fiat A, Naor M. Tracing Traitors[ A]. Advances in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 9Pfitzmann B. Trail of Traced Traitor[A]. Proc of Information Hiding'96~C]. Berlin: Sprinber-Verlag, 1996.49-64.
  • 10杨波,孙晓蓉,王育民.基于门限方案的密钥托管[J].西安电子科技大学学报,1998,25(2):239-241. 被引量:9

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部