Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (16): 99-100.DOI: 10.3778/j.issn.1002-8331.2009.16.028
• 网络、通信、安全 • Previous Articles Next Articles
ZHAO Lin-sen
Received:
Revised:
Online:
Published:
Contact:
赵林森
通讯作者:
Abstract: Traitor tracing schemes are very important to secure the distribution of digital content,which indeed aim at protecting content providers from colluding users to build pirate decoders.If such a collusion happens,at least one member of the latter collusion will be detected.Granted bilinear maps,a scheme is proposed which can be against anonymous pirate decoder attack.For this new scheme,a complete proof against collusion attack is provided,based on the bilinear Diffie-Hellman computational assumptions.
摘要: 叛逆者追踪技术是广播加密多媒体业务中对抗共谋密钥攻击和非法重放攻击的一种重要的数字版权保护技术。基于双线性对提出了一个能有效对抗单用户匿名盗版攻击的叛逆者追踪方案,并且证明了该方案抗合谋攻击的安全性。另外,该方案只需广播传输3个群元素的广播控制报头信息,合法授权用户就可恢复出加密会话密钥信息,提高了广播通信效率。
ZHAO Lin-sen. Traitor tracing scheme against anonymous[J]. Computer Engineering and Applications, 2009, 45(16): 99-100.
赵林森. 可抵抗单用户匿名盗版攻击的叛逆者追踪方案[J]. 计算机工程与应用, 2009, 45(16): 99-100.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2009.16.028
http://cea.ceaj.org/EN/Y2009/V45/I16/99