Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (16): 99-100.DOI: 10.3778/j.issn.1002-8331.2009.16.028

• 网络、通信、安全 • Previous Articles     Next Articles

Traitor tracing scheme against anonymous

ZHAO Lin-sen   

  1. Department of Telecom,Xi’an Institute of Post and Telecommunications,Xi’an 710061,China
  • Received:2008-12-12 Revised:2009-03-09 Online:2009-06-01 Published:2009-06-01
  • Contact: ZHAO Lin-sen

可抵抗单用户匿名盗版攻击的叛逆者追踪方案

赵林森   

  1. 西安邮电学院 电子与信息工程系,西安 710061
  • 通讯作者: 赵林森

Abstract: Traitor tracing schemes are very important to secure the distribution of digital content,which indeed aim at protecting content providers from colluding users to build pirate decoders.If such a collusion happens,at least one member of the latter collusion will be detected.Granted bilinear maps,a scheme is proposed which can be against anonymous pirate decoder attack.For this new scheme,a complete proof against collusion attack is provided,based on the bilinear Diffie-Hellman computational assumptions.

摘要: 叛逆者追踪技术是广播加密多媒体业务中对抗共谋密钥攻击和非法重放攻击的一种重要的数字版权保护技术。基于双线性对提出了一个能有效对抗单用户匿名盗版攻击的叛逆者追踪方案,并且证明了该方案抗合谋攻击的安全性。另外,该方案只需广播传输3个群元素的广播控制报头信息,合法授权用户就可恢复出加密会话密钥信息,提高了广播通信效率。