期刊文献+

一种新的面向多服务抗共谋非对称叛逆者追踪方案 被引量:4

A New Multi-service Oriented Collusion-resistant Asymmetric Traitor Tracing Scheme
在线阅读 下载PDF
导出
摘要 为了更好地保护数据提供商和合法用户的实际利益,以及给合法用户提供多种服务,将会话密钥S分解成S1与S2之和,在大整数分解困难问题的条件下,构造特殊等式来解密S1(方案1)。在离散对数困难问题的条件下,利用不经意多项式估值协议(OPE)和拉格朗日插值多项式来解密S2(方案2)。在两种方案组合的基础上形成一种新的叛逆者追踪方案。新方案具有多服务性、抗共谋、非对称性、黑盒子追踪、前向安全性和后向安全性等优点,综合性能好于现有方案。 To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in which the session key S was divided into a sum of St and S2. Under the condition of large integer factoring problem, S1 was decrypted by constmcting a special equation (scheme 1). Under the condition of discrete logarithm problem, S2 was decrypted by OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2). On the basis of the combination of the scheme 1 and scheme 2, a new traitor tracing scheme was formed. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security,and its whole capabilities is also better than existing ones.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2006年第4期110-116,共7页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60372046) 华为基金资助项目(YSCB2005037NP)
关键词 多服务 抗共谋 非对称 黑盒子追踪 前向安全性 后向安全性 multiple-service collusion-resistance asynanetric black-box tracing forward-security backward-security
  • 相关文献

参考文献11

  • 1Chor B,Fiat A,Naor M.Tracing traitors[C]//Advances in Cryptology-CRYPT'94.Berlin:Springer-Verlag,1994:257-270.
  • 2Tzeng Wenguey,Tzeng Zhijia.A Public-key traitor tracing scheme with revocation using dynamic shares[C]//PKC 2001 Berlin:Springer-Verlag,2001:207-224.
  • 3马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 4Pfitzmann B.Trials of traced traitors[C]//Information Hiding'96.Berlin:Springer-Verlag,1996:49-64.
  • 5Kurosawa K,Desmedt Y.Optimum traitor tracing and asymmetric schemes[C]// Proc of Eurocrypt98.Berlin:Springer-Verlag,1998:145-157.
  • 6Watanabe Y,Hanaoka G,Imai H.Efficient asymmetric public key traitor tracing without trusted agents[C]//CT-RSA2001.Berlin:Springer-Verlag,2001:392-407.
  • 7Kiayias A,Yung M.Breaking and repairing asymmetric public-key traitor tracing[C]//ACM Workshop on DRM2002.Berlin:Springer-Verlag,2003:32-50.
  • 8李勇,杨波.一种高效非对称的动态公钥叛逆者追踪方案[J].西安电子科技大学学报,2003,30(5):654-658. 被引量:11
  • 9Kim C H,Hwang Y H,Lee P J.Practical pay-TV scheme using traitor tracing scheme for multiple channels[C]//WISA 2004.LNCS 3325,Berlin:Springer-Verlag,2004:264277.
  • 10Naor M,Pinkas B.Oblivious transfer and polynomial evaluation[C]//Proc of STOC'99.Atlanta:ACM,1999:245-254.

二级参考文献17

  • 1Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. CRYPTO 1999[C]. Berlin: Springer-Verlag, 1999. 338-353.
  • 2Chor B, Fiat A, Naor M. Tracing Traitors[A]. Advances in Cryptology-CRYPTO94[C]. Berlin: Springer-Verlag, 1994. 257-270.
  • 3Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[A]. ACM Workshop on Digital Rights Managements[C]. Berlin: Springer-Verlag, 2002. 207-224.
  • 4Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Tracing and Asymmetric Schemes[A]. EUROCRYPT 1998[C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 5Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[A]. PKC 2001[C]. Berlin: Springer-Verlag, 2001. 207-224.
  • 6Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[A]. CT-RSA 2001[C]. Berlin: Springer-Verlag, 2001. 392-407.
  • 7Pfizmann B, Waidner M. Asymmetric Fingerprinting for large Collusions[A]. Pmc of ACMCCS'97[C]. Zurich: ACM, 1997. 145-157.
  • 8Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Asymmetric Scheme[ A]. Proc of EUBOCBYFT98[ C]. Berlin: Springer-Verlag, 1998. 145-157.
  • 9Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[A]. Proc of STOC'99[C]. Atlanta: ACM, 1999. 245-254.
  • 10Boneh D, Franklin M. An Efficient Public Key Traitor Tracing Scheme[A]. Proc of CRYPTO'99[C]. Berlin: Sprinber-Verlag, 1999.338-353.

共引文献25

同被引文献36

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部