计算机工程与应用 ›› 2008, Vol. 44 ›› Issue (25): 113-114.DOI: 10.3778/j.issn.1002-8331.2008.25.034

• 网络、通信、安全 • 上一篇    下一篇

一种新的公钥叛逆追踪方案

滕济凯,宋宗余   

  1. 广州大学 数学与信息科学学院,广州 510006
  • 收稿日期:2007-10-29 修回日期:2008-01-21 出版日期:2008-09-01 发布日期:2008-09-01
  • 通讯作者: 滕济凯

New public key traitor tracing scheme

TENG Ji-kai,SONG Zong-yu   

  1. College of Mathematic and Information Science,Guangzhou University,Guangzhou 510006,China
  • Received:2007-10-29 Revised:2008-01-21 Online:2008-09-01 Published:2008-09-01
  • Contact: TENG Ji-kai

摘要: 提出一种公钥叛逆追踪方案,该方案基于RSA和中国剩余定理。在该方案中,用户私钥由用户自己选择,供应商不知道用户私钥的任何信息,也就是说该方案是非对称的。有时用户可能不能共谋,而且当发现盗版的解密盒时,能够通过黑盒子追踪方法追踪到共谋者,追踪算法效率很高而且是确定型的,用户可以随时加入或退出该系统。当供应商发现非法用户时,不要求合法用户做任何改变,就能很方便地取消这些非法用户,用户和供应商都是安全的,并且用户能够确定消息来源的可靠性。

关键词: 共谋, 黑盒子追踪, 叛逆追踪

Abstract: In this paper,a public key traitor tracing scheme is proposed.The scheme is based on RSA and the Chinese Remainder Theorem.In this scheme,secrete keys of the receivers are chosen by themselves,the senders have no knowledge of the secret keys of the receivers,that is to say,the scheme is asymmetric.Traitors can not collude in some case.Furthermore,when pirate decoder is found,traitors can be traced by black_box tracing.The tracing algorithm is efficient and deterministic.When traitors are found,the sender can revoke them without involvement of the remaindering receivers.Both senders and receivers are safe.In addition,the receivers can verify whether the message is from correct source.

Key words: collude, black_box tracing, traitor tracing