Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (23): 155-156.
• 网络、通信与安全 • Previous Articles Next Articles
LI Xue-yuan,WANG Xin-mei
Received:
Revised:
Online:
Published:
Contact:
李学远,王新梅
西安电子科技大学 综合业务网国家重点实验室,西安 710071
通讯作者:
Abstract: Traitor tracing schemes play an important role for secure distribution of digital content.Based on DDH(Decision Diffie-Hellman) assumption and the idea that users choose their personal secret keys and compute their personal public keys,the system utilizes users’ personal public keys to trace traitors,this paper presents a fully public-key asymmetric traitor tracing scheme with public traceability.The scheme can delegate the tracing capability to anyone(trusted or untrusted) and revoke or add a user without updating other users’ secret keys,has some other properties such as anonymity and black-box tracing.
Key words: traitor tracing, DDH assumption, public traceability, black-box tracing
摘要: 广播加密系统中,叛逆者追踪方案起着防止数据盗版的重要作用。基于DDH(Decision Diffie-Hellman)假设,采用用户选择个人密钥并由此计算个人公钥,系统利用用户个人公钥来追踪识别叛逆者的思想,提出一个具有可公开追踪性的完全公钥非对称叛逆者追踪方案。该方案可将追踪过程交给任何信任或不信任的人,能撤销或添加用户而不需更新用户的个人密钥,同时,还具有匿名性、黑盒子追踪等特点。
关键词: 叛逆者追踪, DDH假设, 可公开追踪性, 黑盒子追踪
LI Xue-yuan,WANG Xin-mei. Traitor tracing scheme with public traceability[J]. Computer Engineering and Applications, 2007, 43(23): 155-156.
李学远,王新梅. 一个具有可公开追踪性的叛逆者追踪方案 [J]. 计算机工程与应用, 2007, 43(23): 155-156.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/
http://cea.ceaj.org/EN/Y2007/V43/I23/155